Feb 8 23:19:22.942557 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 8 23:19:22.942587 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:19:22.942598 kernel: BIOS-provided physical RAM map: Feb 8 23:19:22.942606 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 8 23:19:22.942613 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 8 23:19:22.942621 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 8 23:19:22.942630 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Feb 8 23:19:22.942638 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Feb 8 23:19:22.942648 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 8 23:19:22.942656 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 8 23:19:22.942663 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Feb 8 23:19:22.942671 kernel: NX (Execute Disable) protection: active Feb 8 23:19:22.942678 kernel: SMBIOS 2.8 present. Feb 8 23:19:22.942687 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Feb 8 23:19:22.942698 kernel: Hypervisor detected: KVM Feb 8 23:19:22.942707 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 8 23:19:22.942715 kernel: kvm-clock: cpu 0, msr 63faa001, primary cpu clock Feb 8 23:19:22.942723 kernel: kvm-clock: using sched offset of 2756853971 cycles Feb 8 23:19:22.942732 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 8 23:19:22.942740 kernel: tsc: Detected 2794.750 MHz processor Feb 8 23:19:22.942749 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 8 23:19:22.942758 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 8 23:19:22.942770 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Feb 8 23:19:22.942781 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 8 23:19:22.942789 kernel: Using GB pages for direct mapping Feb 8 23:19:22.942798 kernel: ACPI: Early table checksum verification disabled Feb 8 23:19:22.942806 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Feb 8 23:19:22.942815 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:19:22.942823 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:19:22.942832 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:19:22.942840 kernel: ACPI: FACS 0x000000009CFE0000 000040 Feb 8 23:19:22.942849 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:19:22.942873 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:19:22.942881 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:19:22.942890 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Feb 8 23:19:22.942898 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Feb 8 23:19:22.942907 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Feb 8 23:19:22.942915 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Feb 8 23:19:22.942924 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Feb 8 23:19:22.942932 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Feb 8 23:19:22.942947 kernel: No NUMA configuration found Feb 8 23:19:22.942956 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Feb 8 23:19:22.942965 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Feb 8 23:19:22.942974 kernel: Zone ranges: Feb 8 23:19:22.942983 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 8 23:19:22.942992 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Feb 8 23:19:22.943003 kernel: Normal empty Feb 8 23:19:22.943012 kernel: Movable zone start for each node Feb 8 23:19:22.943021 kernel: Early memory node ranges Feb 8 23:19:22.943030 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 8 23:19:22.943039 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Feb 8 23:19:22.943048 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Feb 8 23:19:22.943057 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 8 23:19:22.943066 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 8 23:19:22.943075 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Feb 8 23:19:22.943087 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 8 23:19:22.943096 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 8 23:19:22.943105 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 8 23:19:22.943118 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 8 23:19:22.943127 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 8 23:19:22.943136 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 8 23:19:22.943145 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 8 23:19:22.943154 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 8 23:19:22.943163 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 8 23:19:22.943174 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 8 23:19:22.943183 kernel: TSC deadline timer available Feb 8 23:19:22.943192 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 8 23:19:22.943201 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 8 23:19:22.943210 kernel: kvm-guest: setup PV sched yield Feb 8 23:19:22.943222 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Feb 8 23:19:22.943231 kernel: Booting paravirtualized kernel on KVM Feb 8 23:19:22.943240 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 8 23:19:22.943250 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 8 23:19:22.943259 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 8 23:19:22.943278 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 8 23:19:22.943287 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 8 23:19:22.943296 kernel: kvm-guest: setup async PF for cpu 0 Feb 8 23:19:22.943305 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Feb 8 23:19:22.943314 kernel: kvm-guest: PV spinlocks enabled Feb 8 23:19:22.943323 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 8 23:19:22.943332 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Feb 8 23:19:22.943341 kernel: Policy zone: DMA32 Feb 8 23:19:22.943352 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:19:22.943364 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 8 23:19:22.943374 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 8 23:19:22.943383 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 8 23:19:22.943392 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 8 23:19:22.943401 kernel: Memory: 2438768K/2571756K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 132728K reserved, 0K cma-reserved) Feb 8 23:19:22.943410 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 8 23:19:22.943419 kernel: ftrace: allocating 34475 entries in 135 pages Feb 8 23:19:22.943428 kernel: ftrace: allocated 135 pages with 4 groups Feb 8 23:19:22.943440 kernel: rcu: Hierarchical RCU implementation. Feb 8 23:19:22.943449 kernel: rcu: RCU event tracing is enabled. Feb 8 23:19:22.943459 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 8 23:19:22.943468 kernel: Rude variant of Tasks RCU enabled. Feb 8 23:19:22.943477 kernel: Tracing variant of Tasks RCU enabled. Feb 8 23:19:22.943486 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 8 23:19:22.943495 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 8 23:19:22.943504 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 8 23:19:22.943513 kernel: random: crng init done Feb 8 23:19:22.943524 kernel: Console: colour VGA+ 80x25 Feb 8 23:19:22.943533 kernel: printk: console [ttyS0] enabled Feb 8 23:19:22.943542 kernel: ACPI: Core revision 20210730 Feb 8 23:19:22.943552 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 8 23:19:22.943561 kernel: APIC: Switch to symmetric I/O mode setup Feb 8 23:19:22.943569 kernel: x2apic enabled Feb 8 23:19:22.943578 kernel: Switched APIC routing to physical x2apic. Feb 8 23:19:22.943587 kernel: kvm-guest: setup PV IPIs Feb 8 23:19:22.943596 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 8 23:19:22.943607 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 8 23:19:22.943616 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 8 23:19:22.943625 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 8 23:19:22.943634 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 8 23:19:22.943643 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 8 23:19:22.943656 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 8 23:19:22.943665 kernel: Spectre V2 : Mitigation: Retpolines Feb 8 23:19:22.943677 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 8 23:19:22.943686 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 8 23:19:22.943704 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 8 23:19:22.943713 kernel: RETBleed: Mitigation: untrained return thunk Feb 8 23:19:22.943725 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 8 23:19:22.943734 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 8 23:19:22.943744 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 8 23:19:22.943753 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 8 23:19:22.943763 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 8 23:19:22.943773 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 8 23:19:22.943782 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 8 23:19:22.943794 kernel: Freeing SMP alternatives memory: 32K Feb 8 23:19:22.943803 kernel: pid_max: default: 32768 minimum: 301 Feb 8 23:19:22.943813 kernel: LSM: Security Framework initializing Feb 8 23:19:22.943822 kernel: SELinux: Initializing. Feb 8 23:19:22.943831 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 8 23:19:22.943841 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 8 23:19:22.943851 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 8 23:19:22.943880 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 8 23:19:22.943890 kernel: ... version: 0 Feb 8 23:19:22.943899 kernel: ... bit width: 48 Feb 8 23:19:22.943908 kernel: ... generic registers: 6 Feb 8 23:19:22.943918 kernel: ... value mask: 0000ffffffffffff Feb 8 23:19:22.943927 kernel: ... max period: 00007fffffffffff Feb 8 23:19:22.943936 kernel: ... fixed-purpose events: 0 Feb 8 23:19:22.943946 kernel: ... event mask: 000000000000003f Feb 8 23:19:22.943955 kernel: signal: max sigframe size: 1776 Feb 8 23:19:22.943966 kernel: rcu: Hierarchical SRCU implementation. Feb 8 23:19:22.943976 kernel: smp: Bringing up secondary CPUs ... Feb 8 23:19:22.943985 kernel: x86: Booting SMP configuration: Feb 8 23:19:22.943994 kernel: .... node #0, CPUs: #1 Feb 8 23:19:22.944004 kernel: kvm-clock: cpu 1, msr 63faa041, secondary cpu clock Feb 8 23:19:22.944013 kernel: kvm-guest: setup async PF for cpu 1 Feb 8 23:19:22.944022 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Feb 8 23:19:22.944032 kernel: #2 Feb 8 23:19:22.944041 kernel: kvm-clock: cpu 2, msr 63faa081, secondary cpu clock Feb 8 23:19:22.944051 kernel: kvm-guest: setup async PF for cpu 2 Feb 8 23:19:22.944062 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Feb 8 23:19:22.944071 kernel: #3 Feb 8 23:19:22.944081 kernel: kvm-clock: cpu 3, msr 63faa0c1, secondary cpu clock Feb 8 23:19:22.944090 kernel: kvm-guest: setup async PF for cpu 3 Feb 8 23:19:22.944099 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Feb 8 23:19:22.944108 kernel: smp: Brought up 1 node, 4 CPUs Feb 8 23:19:22.944118 kernel: smpboot: Max logical packages: 1 Feb 8 23:19:22.944127 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 8 23:19:22.944137 kernel: devtmpfs: initialized Feb 8 23:19:22.944152 kernel: x86/mm: Memory block size: 128MB Feb 8 23:19:22.944161 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 8 23:19:22.944171 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 8 23:19:22.944180 kernel: pinctrl core: initialized pinctrl subsystem Feb 8 23:19:22.944190 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 8 23:19:22.944199 kernel: audit: initializing netlink subsys (disabled) Feb 8 23:19:22.944209 kernel: audit: type=2000 audit(1707434362.078:1): state=initialized audit_enabled=0 res=1 Feb 8 23:19:22.944218 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 8 23:19:22.944228 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 8 23:19:22.944239 kernel: cpuidle: using governor menu Feb 8 23:19:22.944248 kernel: ACPI: bus type PCI registered Feb 8 23:19:22.944258 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 8 23:19:22.944267 kernel: dca service started, version 1.12.1 Feb 8 23:19:22.944283 kernel: PCI: Using configuration type 1 for base access Feb 8 23:19:22.944292 kernel: PCI: Using configuration type 1 for extended access Feb 8 23:19:22.944302 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 8 23:19:22.944311 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 8 23:19:22.944321 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 8 23:19:22.944333 kernel: ACPI: Added _OSI(Module Device) Feb 8 23:19:22.944342 kernel: ACPI: Added _OSI(Processor Device) Feb 8 23:19:22.944351 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 8 23:19:22.944361 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 8 23:19:22.944370 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 8 23:19:22.944380 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 8 23:19:22.944389 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 8 23:19:22.944399 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 8 23:19:22.944408 kernel: ACPI: Interpreter enabled Feb 8 23:19:22.944420 kernel: ACPI: PM: (supports S0 S3 S5) Feb 8 23:19:22.944429 kernel: ACPI: Using IOAPIC for interrupt routing Feb 8 23:19:22.944439 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 8 23:19:22.944448 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 8 23:19:22.944458 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 8 23:19:22.944677 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 8 23:19:22.944695 kernel: acpiphp: Slot [3] registered Feb 8 23:19:22.944704 kernel: acpiphp: Slot [4] registered Feb 8 23:19:22.944717 kernel: acpiphp: Slot [5] registered Feb 8 23:19:22.944727 kernel: acpiphp: Slot [6] registered Feb 8 23:19:22.944736 kernel: acpiphp: Slot [7] registered Feb 8 23:19:22.944745 kernel: acpiphp: Slot [8] registered Feb 8 23:19:22.944754 kernel: acpiphp: Slot [9] registered Feb 8 23:19:22.944764 kernel: acpiphp: Slot [10] registered Feb 8 23:19:22.944773 kernel: acpiphp: Slot [11] registered Feb 8 23:19:22.944782 kernel: acpiphp: Slot [12] registered Feb 8 23:19:22.944792 kernel: acpiphp: Slot [13] registered Feb 8 23:19:22.944801 kernel: acpiphp: Slot [14] registered Feb 8 23:19:22.944812 kernel: acpiphp: Slot [15] registered Feb 8 23:19:22.944821 kernel: acpiphp: Slot [16] registered Feb 8 23:19:22.944830 kernel: acpiphp: Slot [17] registered Feb 8 23:19:22.944840 kernel: acpiphp: Slot [18] registered Feb 8 23:19:22.944849 kernel: acpiphp: Slot [19] registered Feb 8 23:19:22.944875 kernel: acpiphp: Slot [20] registered Feb 8 23:19:22.944884 kernel: acpiphp: Slot [21] registered Feb 8 23:19:22.944894 kernel: acpiphp: Slot [22] registered Feb 8 23:19:22.944903 kernel: acpiphp: Slot [23] registered Feb 8 23:19:22.944915 kernel: acpiphp: Slot [24] registered Feb 8 23:19:22.944924 kernel: acpiphp: Slot [25] registered Feb 8 23:19:22.944933 kernel: acpiphp: Slot [26] registered Feb 8 23:19:22.944943 kernel: acpiphp: Slot [27] registered Feb 8 23:19:22.944952 kernel: acpiphp: Slot [28] registered Feb 8 23:19:22.944961 kernel: acpiphp: Slot [29] registered Feb 8 23:19:22.944971 kernel: acpiphp: Slot [30] registered Feb 8 23:19:22.944980 kernel: acpiphp: Slot [31] registered Feb 8 23:19:22.944989 kernel: PCI host bridge to bus 0000:00 Feb 8 23:19:22.945123 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 8 23:19:22.945228 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 8 23:19:22.945334 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 8 23:19:22.945429 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 8 23:19:22.945523 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 8 23:19:22.945617 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 8 23:19:22.945758 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 8 23:19:22.945923 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 8 23:19:22.946068 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 8 23:19:22.946176 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 8 23:19:22.946288 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 8 23:19:22.946395 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 8 23:19:22.946501 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 8 23:19:22.946610 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 8 23:19:22.946734 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 8 23:19:22.946840 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 8 23:19:22.946965 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 8 23:19:22.947097 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 8 23:19:22.947203 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Feb 8 23:19:22.947317 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Feb 8 23:19:22.947428 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Feb 8 23:19:22.947533 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 8 23:19:22.947660 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 8 23:19:22.947768 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Feb 8 23:19:22.947914 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Feb 8 23:19:22.948027 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Feb 8 23:19:22.948145 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 8 23:19:22.948258 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 8 23:19:22.948372 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Feb 8 23:19:22.948477 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Feb 8 23:19:22.948601 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 8 23:19:22.948707 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 8 23:19:22.948813 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Feb 8 23:19:22.948936 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Feb 8 23:19:22.949049 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Feb 8 23:19:22.949062 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 8 23:19:22.949072 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 8 23:19:22.949082 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 8 23:19:22.949092 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 8 23:19:22.949101 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 8 23:19:22.949111 kernel: iommu: Default domain type: Translated Feb 8 23:19:22.949120 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 8 23:19:22.949226 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 8 23:19:22.949345 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 8 23:19:22.949462 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 8 23:19:22.949478 kernel: vgaarb: loaded Feb 8 23:19:22.949488 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 8 23:19:22.949498 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 8 23:19:22.949507 kernel: PTP clock support registered Feb 8 23:19:22.949517 kernel: PCI: Using ACPI for IRQ routing Feb 8 23:19:22.949526 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 8 23:19:22.949539 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 8 23:19:22.949549 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Feb 8 23:19:22.949558 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 8 23:19:22.949567 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 8 23:19:22.949577 kernel: clocksource: Switched to clocksource kvm-clock Feb 8 23:19:22.949586 kernel: VFS: Disk quotas dquot_6.6.0 Feb 8 23:19:22.949603 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 8 23:19:22.949619 kernel: pnp: PnP ACPI init Feb 8 23:19:22.949795 kernel: pnp 00:02: [dma 2] Feb 8 23:19:22.949828 kernel: pnp: PnP ACPI: found 6 devices Feb 8 23:19:22.949838 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 8 23:19:22.949848 kernel: NET: Registered PF_INET protocol family Feb 8 23:19:22.949879 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 8 23:19:22.949894 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 8 23:19:22.949904 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 8 23:19:22.949913 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 8 23:19:22.949923 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 8 23:19:22.949951 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 8 23:19:22.949961 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 8 23:19:22.949971 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 8 23:19:22.949980 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 8 23:19:22.950002 kernel: NET: Registered PF_XDP protocol family Feb 8 23:19:22.950127 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 8 23:19:22.950245 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 8 23:19:22.950371 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 8 23:19:22.950489 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 8 23:19:22.950626 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 8 23:19:22.950783 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 8 23:19:22.950966 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 8 23:19:22.951128 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 8 23:19:22.951144 kernel: PCI: CLS 0 bytes, default 64 Feb 8 23:19:22.951154 kernel: Initialise system trusted keyrings Feb 8 23:19:22.951163 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 8 23:19:22.951186 kernel: Key type asymmetric registered Feb 8 23:19:22.951200 kernel: Asymmetric key parser 'x509' registered Feb 8 23:19:22.951210 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 8 23:19:22.951230 kernel: io scheduler mq-deadline registered Feb 8 23:19:22.951242 kernel: io scheduler kyber registered Feb 8 23:19:22.951251 kernel: io scheduler bfq registered Feb 8 23:19:22.951261 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 8 23:19:22.951279 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 8 23:19:22.951289 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 8 23:19:22.951298 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 8 23:19:22.951324 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 8 23:19:22.951334 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 8 23:19:22.951344 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 8 23:19:22.951353 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 8 23:19:22.951376 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 8 23:19:22.951386 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 8 23:19:22.951561 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 8 23:19:22.951663 kernel: rtc_cmos 00:05: registered as rtc0 Feb 8 23:19:22.951766 kernel: rtc_cmos 00:05: setting system clock to 2024-02-08T23:19:22 UTC (1707434362) Feb 8 23:19:22.951878 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 8 23:19:22.951892 kernel: NET: Registered PF_INET6 protocol family Feb 8 23:19:22.951902 kernel: Segment Routing with IPv6 Feb 8 23:19:22.951912 kernel: In-situ OAM (IOAM) with IPv6 Feb 8 23:19:22.951921 kernel: NET: Registered PF_PACKET protocol family Feb 8 23:19:22.951930 kernel: Key type dns_resolver registered Feb 8 23:19:22.951940 kernel: IPI shorthand broadcast: enabled Feb 8 23:19:22.951949 kernel: sched_clock: Marking stable (390355466, 71850961)->(472133320, -9926893) Feb 8 23:19:22.951962 kernel: registered taskstats version 1 Feb 8 23:19:22.951972 kernel: Loading compiled-in X.509 certificates Feb 8 23:19:22.951982 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 8 23:19:22.951991 kernel: Key type .fscrypt registered Feb 8 23:19:22.952001 kernel: Key type fscrypt-provisioning registered Feb 8 23:19:22.952010 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 8 23:19:22.952020 kernel: ima: Allocated hash algorithm: sha1 Feb 8 23:19:22.952029 kernel: ima: No architecture policies found Feb 8 23:19:22.952041 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 8 23:19:22.952051 kernel: Write protecting the kernel read-only data: 28672k Feb 8 23:19:22.952060 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 8 23:19:22.952069 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 8 23:19:22.952079 kernel: Run /init as init process Feb 8 23:19:22.952088 kernel: with arguments: Feb 8 23:19:22.952098 kernel: /init Feb 8 23:19:22.952107 kernel: with environment: Feb 8 23:19:22.952128 kernel: HOME=/ Feb 8 23:19:22.952140 kernel: TERM=linux Feb 8 23:19:22.952151 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 8 23:19:22.952168 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 8 23:19:22.952181 systemd[1]: Detected virtualization kvm. Feb 8 23:19:22.952192 systemd[1]: Detected architecture x86-64. Feb 8 23:19:22.952202 systemd[1]: Running in initrd. Feb 8 23:19:22.952213 systemd[1]: No hostname configured, using default hostname. Feb 8 23:19:22.952225 systemd[1]: Hostname set to . Feb 8 23:19:22.952236 systemd[1]: Initializing machine ID from VM UUID. Feb 8 23:19:22.952246 systemd[1]: Queued start job for default target initrd.target. Feb 8 23:19:22.952256 systemd[1]: Started systemd-ask-password-console.path. Feb 8 23:19:22.952267 systemd[1]: Reached target cryptsetup.target. Feb 8 23:19:22.952284 systemd[1]: Reached target paths.target. Feb 8 23:19:22.952295 systemd[1]: Reached target slices.target. Feb 8 23:19:22.952305 systemd[1]: Reached target swap.target. Feb 8 23:19:22.952315 systemd[1]: Reached target timers.target. Feb 8 23:19:22.952328 systemd[1]: Listening on iscsid.socket. Feb 8 23:19:22.952339 systemd[1]: Listening on iscsiuio.socket. Feb 8 23:19:22.952349 systemd[1]: Listening on systemd-journald-audit.socket. Feb 8 23:19:22.952360 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 8 23:19:22.952370 systemd[1]: Listening on systemd-journald.socket. Feb 8 23:19:22.952381 systemd[1]: Listening on systemd-networkd.socket. Feb 8 23:19:22.952392 systemd[1]: Listening on systemd-udevd-control.socket. Feb 8 23:19:22.952404 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 8 23:19:22.952414 systemd[1]: Reached target sockets.target. Feb 8 23:19:22.952425 systemd[1]: Starting kmod-static-nodes.service... Feb 8 23:19:22.952435 systemd[1]: Finished network-cleanup.service. Feb 8 23:19:22.952446 systemd[1]: Starting systemd-fsck-usr.service... Feb 8 23:19:22.952456 systemd[1]: Starting systemd-journald.service... Feb 8 23:19:22.952467 systemd[1]: Starting systemd-modules-load.service... Feb 8 23:19:22.952479 systemd[1]: Starting systemd-resolved.service... Feb 8 23:19:22.952490 systemd[1]: Starting systemd-vconsole-setup.service... Feb 8 23:19:22.952501 systemd[1]: Finished kmod-static-nodes.service. Feb 8 23:19:22.952512 systemd[1]: Finished systemd-fsck-usr.service. Feb 8 23:19:22.952522 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 8 23:19:22.952532 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 8 23:19:22.952547 systemd-journald[198]: Journal started Feb 8 23:19:22.952600 systemd-journald[198]: Runtime Journal (/run/log/journal/a2e1e2ff5458416986badd3b3f359120) is 6.0M, max 48.5M, 42.5M free. Feb 8 23:19:22.937790 systemd-modules-load[199]: Inserted module 'overlay' Feb 8 23:19:22.970244 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 8 23:19:22.970281 kernel: Bridge firewalling registered Feb 8 23:19:22.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.960099 systemd-resolved[200]: Positive Trust Anchors: Feb 8 23:19:22.973312 kernel: audit: type=1130 audit(1707434362.969:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.973326 systemd[1]: Started systemd-journald.service. Feb 8 23:19:22.960106 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 8 23:19:22.960133 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 8 23:19:22.962453 systemd-resolved[200]: Defaulting to hostname 'linux'. Feb 8 23:19:22.963065 systemd-modules-load[199]: Inserted module 'br_netfilter' Feb 8 23:19:22.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.979537 systemd[1]: Started systemd-resolved.service. Feb 8 23:19:22.988383 kernel: audit: type=1130 audit(1707434362.978:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.988399 kernel: SCSI subsystem initialized Feb 8 23:19:22.988408 kernel: audit: type=1130 audit(1707434362.981:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.988418 kernel: audit: type=1130 audit(1707434362.983:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.982490 systemd[1]: Finished systemd-vconsole-setup.service. Feb 8 23:19:22.984737 systemd[1]: Reached target nss-lookup.target. Feb 8 23:19:22.987795 systemd[1]: Starting dracut-cmdline-ask.service... Feb 8 23:19:22.993310 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 8 23:19:22.993337 kernel: device-mapper: uevent: version 1.0.3 Feb 8 23:19:22.993356 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 8 23:19:22.996068 systemd-modules-load[199]: Inserted module 'dm_multipath' Feb 8 23:19:22.996785 systemd[1]: Finished systemd-modules-load.service. Feb 8 23:19:22.999963 kernel: audit: type=1130 audit(1707434362.996:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:22.998178 systemd[1]: Starting systemd-sysctl.service... Feb 8 23:19:23.003227 systemd[1]: Finished dracut-cmdline-ask.service. Feb 8 23:19:23.007933 kernel: audit: type=1130 audit(1707434363.002:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.004397 systemd[1]: Starting dracut-cmdline.service... Feb 8 23:19:23.008980 systemd[1]: Finished systemd-sysctl.service. Feb 8 23:19:23.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.012901 kernel: audit: type=1130 audit(1707434363.009:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.014470 dracut-cmdline[220]: dracut-dracut-053 Feb 8 23:19:23.016547 dracut-cmdline[220]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:19:23.064882 kernel: Loading iSCSI transport class v2.0-870. Feb 8 23:19:23.074884 kernel: iscsi: registered transport (tcp) Feb 8 23:19:23.093884 kernel: iscsi: registered transport (qla4xxx) Feb 8 23:19:23.093906 kernel: QLogic iSCSI HBA Driver Feb 8 23:19:23.120998 systemd[1]: Finished dracut-cmdline.service. Feb 8 23:19:23.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.122934 systemd[1]: Starting dracut-pre-udev.service... Feb 8 23:19:23.125416 kernel: audit: type=1130 audit(1707434363.121:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.167879 kernel: raid6: avx2x4 gen() 30049 MB/s Feb 8 23:19:23.184875 kernel: raid6: avx2x4 xor() 7452 MB/s Feb 8 23:19:23.201872 kernel: raid6: avx2x2 gen() 32252 MB/s Feb 8 23:19:23.218869 kernel: raid6: avx2x2 xor() 19327 MB/s Feb 8 23:19:23.235866 kernel: raid6: avx2x1 gen() 26639 MB/s Feb 8 23:19:23.252872 kernel: raid6: avx2x1 xor() 15451 MB/s Feb 8 23:19:23.269872 kernel: raid6: sse2x4 gen() 14913 MB/s Feb 8 23:19:23.286867 kernel: raid6: sse2x4 xor() 7406 MB/s Feb 8 23:19:23.303868 kernel: raid6: sse2x2 gen() 16255 MB/s Feb 8 23:19:23.320871 kernel: raid6: sse2x2 xor() 9801 MB/s Feb 8 23:19:23.337869 kernel: raid6: sse2x1 gen() 12424 MB/s Feb 8 23:19:23.354958 kernel: raid6: sse2x1 xor() 7779 MB/s Feb 8 23:19:23.354974 kernel: raid6: using algorithm avx2x2 gen() 32252 MB/s Feb 8 23:19:23.354983 kernel: raid6: .... xor() 19327 MB/s, rmw enabled Feb 8 23:19:23.355922 kernel: raid6: using avx2x2 recovery algorithm Feb 8 23:19:23.366871 kernel: xor: automatically using best checksumming function avx Feb 8 23:19:23.457881 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 8 23:19:23.466342 systemd[1]: Finished dracut-pre-udev.service. Feb 8 23:19:23.469452 kernel: audit: type=1130 audit(1707434363.465:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.468000 audit: BPF prog-id=7 op=LOAD Feb 8 23:19:23.468000 audit: BPF prog-id=8 op=LOAD Feb 8 23:19:23.469947 systemd[1]: Starting systemd-udevd.service... Feb 8 23:19:23.482684 systemd-udevd[399]: Using default interface naming scheme 'v252'. Feb 8 23:19:23.487303 systemd[1]: Started systemd-udevd.service. Feb 8 23:19:23.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.488388 systemd[1]: Starting dracut-pre-trigger.service... Feb 8 23:19:23.500569 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation Feb 8 23:19:23.534265 systemd[1]: Finished dracut-pre-trigger.service. Feb 8 23:19:23.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.536199 systemd[1]: Starting systemd-udev-trigger.service... Feb 8 23:19:23.582426 systemd[1]: Finished systemd-udev-trigger.service. Feb 8 23:19:23.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:23.608954 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 8 23:19:23.610876 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 8 23:19:23.610898 kernel: GPT:9289727 != 19775487 Feb 8 23:19:23.610907 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 8 23:19:23.612320 kernel: GPT:9289727 != 19775487 Feb 8 23:19:23.612341 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 8 23:19:23.612355 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 8 23:19:23.618250 kernel: cryptd: max_cpu_qlen set to 1000 Feb 8 23:19:23.624873 kernel: libata version 3.00 loaded. Feb 8 23:19:23.627881 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 8 23:19:23.629540 kernel: scsi host0: ata_piix Feb 8 23:19:23.629663 kernel: AVX2 version of gcm_enc/dec engaged. Feb 8 23:19:23.629673 kernel: scsi host1: ata_piix Feb 8 23:19:23.631982 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 8 23:19:23.632008 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 8 23:19:23.632871 kernel: AES CTR mode by8 optimization enabled Feb 8 23:19:23.647276 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 8 23:19:23.672658 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (458) Feb 8 23:19:23.670228 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 8 23:19:23.673977 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 8 23:19:23.681793 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 8 23:19:23.685351 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 8 23:19:23.686684 systemd[1]: Starting disk-uuid.service... Feb 8 23:19:23.694363 disk-uuid[519]: Primary Header is updated. Feb 8 23:19:23.694363 disk-uuid[519]: Secondary Entries is updated. Feb 8 23:19:23.694363 disk-uuid[519]: Secondary Header is updated. Feb 8 23:19:23.697876 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 8 23:19:23.700873 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 8 23:19:23.791881 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 8 23:19:23.791922 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 8 23:19:23.821881 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 8 23:19:23.822039 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 8 23:19:23.838885 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 8 23:19:24.701513 disk-uuid[520]: The operation has completed successfully. Feb 8 23:19:24.702459 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 8 23:19:24.724956 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 8 23:19:24.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.725042 systemd[1]: Finished disk-uuid.service. Feb 8 23:19:24.731830 systemd[1]: Starting verity-setup.service... Feb 8 23:19:24.744880 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 8 23:19:24.763907 systemd[1]: Found device dev-mapper-usr.device. Feb 8 23:19:24.766387 systemd[1]: Mounting sysusr-usr.mount... Feb 8 23:19:24.768512 systemd[1]: Finished verity-setup.service. Feb 8 23:19:24.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.825886 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 8 23:19:24.826218 systemd[1]: Mounted sysusr-usr.mount. Feb 8 23:19:24.826873 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 8 23:19:24.827557 systemd[1]: Starting ignition-setup.service... Feb 8 23:19:24.829400 systemd[1]: Starting parse-ip-for-networkd.service... Feb 8 23:19:24.836334 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:19:24.836370 kernel: BTRFS info (device vda6): using free space tree Feb 8 23:19:24.836387 kernel: BTRFS info (device vda6): has skinny extents Feb 8 23:19:24.844819 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 8 23:19:24.851840 systemd[1]: Finished ignition-setup.service. Feb 8 23:19:24.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.853491 systemd[1]: Starting ignition-fetch-offline.service... Feb 8 23:19:24.888541 ignition[628]: Ignition 2.14.0 Feb 8 23:19:24.888596 ignition[628]: Stage: fetch-offline Feb 8 23:19:24.888665 ignition[628]: no configs at "/usr/lib/ignition/base.d" Feb 8 23:19:24.888676 ignition[628]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 8 23:19:24.888809 ignition[628]: parsed url from cmdline: "" Feb 8 23:19:24.888813 ignition[628]: no config URL provided Feb 8 23:19:24.888819 ignition[628]: reading system config file "/usr/lib/ignition/user.ign" Feb 8 23:19:24.888830 ignition[628]: no config at "/usr/lib/ignition/user.ign" Feb 8 23:19:24.888850 ignition[628]: op(1): [started] loading QEMU firmware config module Feb 8 23:19:24.888871 ignition[628]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 8 23:19:24.892510 ignition[628]: op(1): [finished] loading QEMU firmware config module Feb 8 23:19:24.892555 ignition[628]: QEMU firmware config was not found. Ignoring... Feb 8 23:19:24.902901 systemd[1]: Finished parse-ip-for-networkd.service. Feb 8 23:19:24.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.903000 audit: BPF prog-id=9 op=LOAD Feb 8 23:19:24.905263 systemd[1]: Starting systemd-networkd.service... Feb 8 23:19:24.907351 ignition[628]: parsing config with SHA512: e5980c25806722b938410d7c4f910ebfeafd3b5ce6e835c4920b65d479b8499e5c2f66de2b7e97e9ee062fc4d89fd70cd4c033de0b504ca1045c9afa957ee50c Feb 8 23:19:24.928105 systemd-networkd[714]: lo: Link UP Feb 8 23:19:24.928118 systemd-networkd[714]: lo: Gained carrier Feb 8 23:19:24.929354 unknown[628]: fetched base config from "system" Feb 8 23:19:24.929361 unknown[628]: fetched user config from "qemu" Feb 8 23:19:24.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.929805 ignition[628]: fetch-offline: fetch-offline passed Feb 8 23:19:24.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.930395 systemd-networkd[714]: Enumeration completed Feb 8 23:19:24.929875 ignition[628]: Ignition finished successfully Feb 8 23:19:24.930733 systemd-networkd[714]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:19:24.930969 systemd[1]: Started systemd-networkd.service. Feb 8 23:19:24.931593 systemd[1]: Finished ignition-fetch-offline.service. Feb 8 23:19:24.932544 systemd[1]: Reached target network.target. Feb 8 23:19:24.932745 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 8 23:19:24.933458 systemd[1]: Starting ignition-kargs.service... Feb 8 23:19:24.933612 systemd-networkd[714]: eth0: Link UP Feb 8 23:19:24.933617 systemd-networkd[714]: eth0: Gained carrier Feb 8 23:19:24.936963 systemd[1]: Starting iscsiuio.service... Feb 8 23:19:24.945072 ignition[717]: Ignition 2.14.0 Feb 8 23:19:24.945083 ignition[717]: Stage: kargs Feb 8 23:19:24.945250 systemd[1]: Started iscsiuio.service. Feb 8 23:19:24.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.945190 ignition[717]: no configs at "/usr/lib/ignition/base.d" Feb 8 23:19:24.945201 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 8 23:19:24.946147 ignition[717]: kargs: kargs passed Feb 8 23:19:24.946190 ignition[717]: Ignition finished successfully Feb 8 23:19:24.949877 systemd[1]: Starting iscsid.service... Feb 8 23:19:24.950936 systemd[1]: Finished ignition-kargs.service. Feb 8 23:19:24.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.952767 systemd[1]: Starting ignition-disks.service... Feb 8 23:19:24.953826 iscsid[727]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 8 23:19:24.953826 iscsid[727]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 8 23:19:24.953826 iscsid[727]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 8 23:19:24.953826 iscsid[727]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 8 23:19:24.953826 iscsid[727]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 8 23:19:24.953826 iscsid[727]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 8 23:19:24.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.954925 systemd[1]: Started iscsid.service. Feb 8 23:19:24.959429 systemd[1]: Starting dracut-initqueue.service... Feb 8 23:19:24.966945 systemd-networkd[714]: eth0: DHCPv4 address 10.0.0.51/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 8 23:19:24.969929 systemd[1]: Finished dracut-initqueue.service. Feb 8 23:19:24.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.970383 systemd[1]: Reached target remote-fs-pre.target. Feb 8 23:19:24.971381 systemd[1]: Reached target remote-cryptsetup.target. Feb 8 23:19:24.971589 systemd[1]: Reached target remote-fs.target. Feb 8 23:19:24.972603 systemd[1]: Starting dracut-pre-mount.service... Feb 8 23:19:24.975153 ignition[728]: Ignition 2.14.0 Feb 8 23:19:24.975162 ignition[728]: Stage: disks Feb 8 23:19:24.975275 ignition[728]: no configs at "/usr/lib/ignition/base.d" Feb 8 23:19:24.975284 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 8 23:19:24.978195 ignition[728]: disks: disks passed Feb 8 23:19:24.978243 ignition[728]: Ignition finished successfully Feb 8 23:19:24.979882 systemd[1]: Finished ignition-disks.service. Feb 8 23:19:24.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.980326 systemd[1]: Finished dracut-pre-mount.service. Feb 8 23:19:24.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:24.981253 systemd[1]: Reached target initrd-root-device.target. Feb 8 23:19:24.982171 systemd[1]: Reached target local-fs-pre.target. Feb 8 23:19:24.982400 systemd[1]: Reached target local-fs.target. Feb 8 23:19:24.982617 systemd[1]: Reached target sysinit.target. Feb 8 23:19:24.982834 systemd[1]: Reached target basic.target. Feb 8 23:19:24.986787 systemd[1]: Starting systemd-fsck-root.service... Feb 8 23:19:24.996865 systemd-fsck[749]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 8 23:19:25.001722 systemd[1]: Finished systemd-fsck-root.service. Feb 8 23:19:25.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:25.003098 systemd[1]: Mounting sysroot.mount... Feb 8 23:19:25.009876 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 8 23:19:25.010267 systemd[1]: Mounted sysroot.mount. Feb 8 23:19:25.011262 systemd[1]: Reached target initrd-root-fs.target. Feb 8 23:19:25.012626 systemd[1]: Mounting sysroot-usr.mount... Feb 8 23:19:25.013361 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 8 23:19:25.013392 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 8 23:19:25.013412 systemd[1]: Reached target ignition-diskful.target. Feb 8 23:19:25.015172 systemd[1]: Mounted sysroot-usr.mount. Feb 8 23:19:25.017286 systemd[1]: Starting initrd-setup-root.service... Feb 8 23:19:25.022967 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Feb 8 23:19:25.026885 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Feb 8 23:19:25.029942 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Feb 8 23:19:25.033437 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Feb 8 23:19:25.058181 systemd[1]: Finished initrd-setup-root.service. Feb 8 23:19:25.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:25.059412 systemd[1]: Starting ignition-mount.service... Feb 8 23:19:25.060482 systemd[1]: Starting sysroot-boot.service... Feb 8 23:19:25.064950 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Feb 8 23:19:25.073230 ignition[802]: INFO : Ignition 2.14.0 Feb 8 23:19:25.073230 ignition[802]: INFO : Stage: mount Feb 8 23:19:25.075081 ignition[802]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 8 23:19:25.075081 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 8 23:19:25.075081 ignition[802]: INFO : mount: mount passed Feb 8 23:19:25.075081 ignition[802]: INFO : Ignition finished successfully Feb 8 23:19:25.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:25.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:25.075193 systemd[1]: Finished ignition-mount.service. Feb 8 23:19:25.078297 systemd[1]: Finished sysroot-boot.service. Feb 8 23:19:25.309687 systemd-resolved[200]: Detected conflict on linux IN A 10.0.0.51 Feb 8 23:19:25.309704 systemd-resolved[200]: Hostname conflict, changing published hostname from 'linux' to 'linux7'. Feb 8 23:19:25.775218 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 8 23:19:25.782249 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (810) Feb 8 23:19:25.782277 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:19:25.782287 kernel: BTRFS info (device vda6): using free space tree Feb 8 23:19:25.783373 kernel: BTRFS info (device vda6): has skinny extents Feb 8 23:19:25.786442 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 8 23:19:25.787829 systemd[1]: Starting ignition-files.service... Feb 8 23:19:25.800779 ignition[830]: INFO : Ignition 2.14.0 Feb 8 23:19:25.800779 ignition[830]: INFO : Stage: files Feb 8 23:19:25.801999 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 8 23:19:25.801999 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 8 23:19:25.803733 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Feb 8 23:19:25.803733 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 8 23:19:25.803733 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 8 23:19:25.806835 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 8 23:19:25.806835 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 8 23:19:25.806835 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 8 23:19:25.806835 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 8 23:19:25.806835 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 8 23:19:25.805040 unknown[830]: wrote ssh authorized keys file for user: core Feb 8 23:19:26.177328 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 8 23:19:26.319553 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 8 23:19:26.321815 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 8 23:19:26.321815 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 8 23:19:26.321815 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 8 23:19:26.625583 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 8 23:19:26.730568 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 8 23:19:26.730568 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 8 23:19:26.734592 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 8 23:19:26.734592 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 8 23:19:26.790016 systemd-networkd[714]: eth0: Gained IPv6LL Feb 8 23:19:26.889241 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 8 23:19:27.220945 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 8 23:19:27.223080 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 8 23:19:27.223080 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 8 23:19:27.223080 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 8 23:19:27.275495 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 8 23:19:27.903131 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 8 23:19:27.906013 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 8 23:19:27.906013 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 8 23:19:27.906013 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 8 23:19:27.906013 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 8 23:19:27.906013 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 8 23:19:27.913338 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 8 23:19:27.913338 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 8 23:19:27.913338 ignition[830]: INFO : files: op(a): [started] processing unit "coreos-metadata.service" Feb 8 23:19:27.917325 ignition[830]: INFO : files: op(a): op(b): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 8 23:19:27.919019 ignition[830]: INFO : files: op(a): op(b): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 8 23:19:27.919019 ignition[830]: INFO : files: op(a): [finished] processing unit "coreos-metadata.service" Feb 8 23:19:27.921798 ignition[830]: INFO : files: op(c): [started] processing unit "prepare-cni-plugins.service" Feb 8 23:19:27.921798 ignition[830]: INFO : files: op(c): op(d): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 8 23:19:27.924609 ignition[830]: INFO : files: op(c): op(d): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 8 23:19:27.924609 ignition[830]: INFO : files: op(c): [finished] processing unit "prepare-cni-plugins.service" Feb 8 23:19:27.924609 ignition[830]: INFO : files: op(e): [started] processing unit "prepare-critools.service" Feb 8 23:19:27.924609 ignition[830]: INFO : files: op(e): op(f): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 8 23:19:27.930301 ignition[830]: INFO : files: op(e): op(f): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 8 23:19:27.930301 ignition[830]: INFO : files: op(e): [finished] processing unit "prepare-critools.service" Feb 8 23:19:27.930301 ignition[830]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Feb 8 23:19:27.930301 ignition[830]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 8 23:19:27.957811 ignition[830]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 8 23:19:27.959067 ignition[830]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Feb 8 23:19:27.959067 ignition[830]: INFO : files: op(12): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 8 23:19:27.959067 ignition[830]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 8 23:19:27.959067 ignition[830]: INFO : files: op(13): [started] setting preset to enabled for "prepare-critools.service" Feb 8 23:19:27.963353 ignition[830]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-critools.service" Feb 8 23:19:27.964303 ignition[830]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 8 23:19:27.965458 ignition[830]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 8 23:19:27.966575 ignition[830]: INFO : files: files passed Feb 8 23:19:27.967115 ignition[830]: INFO : Ignition finished successfully Feb 8 23:19:27.968606 systemd[1]: Finished ignition-files.service. Feb 8 23:19:27.972421 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 8 23:19:27.972440 kernel: audit: type=1130 audit(1707434367.968:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:27.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:27.972469 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 8 23:19:27.972805 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 8 23:19:27.973535 systemd[1]: Starting ignition-quench.service... Feb 8 23:19:27.976259 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 8 23:19:27.976335 systemd[1]: Finished ignition-quench.service. Feb 8 23:19:27.981971 kernel: audit: type=1130 audit(1707434367.975:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:27.981987 kernel: audit: type=1131 audit(1707434367.975:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:27.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:27.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:27.984546 initrd-setup-root-after-ignition[855]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 8 23:19:27.986664 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 8 23:19:27.988042 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 8 23:19:27.992071 kernel: audit: type=1130 audit(1707434367.987:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:27.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:27.988424 systemd[1]: Reached target ignition-complete.target. Feb 8 23:19:27.992633 systemd[1]: Starting initrd-parse-etc.service... Feb 8 23:19:28.003620 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 8 23:19:28.003698 systemd[1]: Finished initrd-parse-etc.service. Feb 8 23:19:28.009879 kernel: audit: type=1130 audit(1707434368.004:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.009895 kernel: audit: type=1131 audit(1707434368.004:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.004981 systemd[1]: Reached target initrd-fs.target. Feb 8 23:19:28.009896 systemd[1]: Reached target initrd.target. Feb 8 23:19:28.010457 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 8 23:19:28.011062 systemd[1]: Starting dracut-pre-pivot.service... Feb 8 23:19:28.019897 systemd[1]: Finished dracut-pre-pivot.service. Feb 8 23:19:28.023770 kernel: audit: type=1130 audit(1707434368.019:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.021221 systemd[1]: Starting initrd-cleanup.service... Feb 8 23:19:28.029478 systemd[1]: Stopped target nss-lookup.target. Feb 8 23:19:28.030133 systemd[1]: Stopped target remote-cryptsetup.target. Feb 8 23:19:28.031226 systemd[1]: Stopped target timers.target. Feb 8 23:19:28.032303 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 8 23:19:28.036375 kernel: audit: type=1131 audit(1707434368.032:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.032389 systemd[1]: Stopped dracut-pre-pivot.service. Feb 8 23:19:28.033439 systemd[1]: Stopped target initrd.target. Feb 8 23:19:28.036456 systemd[1]: Stopped target basic.target. Feb 8 23:19:28.037519 systemd[1]: Stopped target ignition-complete.target. Feb 8 23:19:28.038606 systemd[1]: Stopped target ignition-diskful.target. Feb 8 23:19:28.039699 systemd[1]: Stopped target initrd-root-device.target. Feb 8 23:19:28.040898 systemd[1]: Stopped target remote-fs.target. Feb 8 23:19:28.042009 systemd[1]: Stopped target remote-fs-pre.target. Feb 8 23:19:28.043162 systemd[1]: Stopped target sysinit.target. Feb 8 23:19:28.044212 systemd[1]: Stopped target local-fs.target. Feb 8 23:19:28.045277 systemd[1]: Stopped target local-fs-pre.target. Feb 8 23:19:28.046338 systemd[1]: Stopped target swap.target. Feb 8 23:19:28.051383 kernel: audit: type=1131 audit(1707434368.047:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.047323 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 8 23:19:28.047412 systemd[1]: Stopped dracut-pre-mount.service. Feb 8 23:19:28.055674 kernel: audit: type=1131 audit(1707434368.051:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.048506 systemd[1]: Stopped target cryptsetup.target. Feb 8 23:19:28.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.051423 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 8 23:19:28.051508 systemd[1]: Stopped dracut-initqueue.service. Feb 8 23:19:28.052737 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 8 23:19:28.052848 systemd[1]: Stopped ignition-fetch-offline.service. Feb 8 23:19:28.055809 systemd[1]: Stopped target paths.target. Feb 8 23:19:28.056801 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 8 23:19:28.058921 systemd[1]: Stopped systemd-ask-password-console.path. Feb 8 23:19:28.060304 systemd[1]: Stopped target slices.target. Feb 8 23:19:28.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.061480 systemd[1]: Stopped target sockets.target. Feb 8 23:19:28.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.062975 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 8 23:19:28.063111 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 8 23:19:28.069468 iscsid[727]: iscsid shutting down. Feb 8 23:19:28.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.064537 systemd[1]: ignition-files.service: Deactivated successfully. Feb 8 23:19:28.064663 systemd[1]: Stopped ignition-files.service. Feb 8 23:19:28.066627 systemd[1]: Stopping ignition-mount.service... Feb 8 23:19:28.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.068852 systemd[1]: Stopping iscsid.service... Feb 8 23:19:28.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.069443 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 8 23:19:28.069605 systemd[1]: Stopped kmod-static-nodes.service. Feb 8 23:19:28.071226 systemd[1]: Stopping sysroot-boot.service... Feb 8 23:19:28.078377 ignition[870]: INFO : Ignition 2.14.0 Feb 8 23:19:28.078377 ignition[870]: INFO : Stage: umount Feb 8 23:19:28.078377 ignition[870]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 8 23:19:28.078377 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 8 23:19:28.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.072345 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 8 23:19:28.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.083560 ignition[870]: INFO : umount: umount passed Feb 8 23:19:28.083560 ignition[870]: INFO : Ignition finished successfully Feb 8 23:19:28.072523 systemd[1]: Stopped systemd-udev-trigger.service. Feb 8 23:19:28.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.073914 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 8 23:19:28.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.074103 systemd[1]: Stopped dracut-pre-trigger.service. Feb 8 23:19:28.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.079228 systemd[1]: iscsid.service: Deactivated successfully. Feb 8 23:19:28.079335 systemd[1]: Stopped iscsid.service. Feb 8 23:19:28.079949 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 8 23:19:28.080049 systemd[1]: Finished initrd-cleanup.service. Feb 8 23:19:28.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.081481 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 8 23:19:28.081576 systemd[1]: Stopped ignition-mount.service. Feb 8 23:19:28.082781 systemd[1]: iscsid.socket: Deactivated successfully. Feb 8 23:19:28.082820 systemd[1]: Closed iscsid.socket. Feb 8 23:19:28.083874 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 8 23:19:28.083921 systemd[1]: Stopped ignition-disks.service. Feb 8 23:19:28.085703 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 8 23:19:28.085742 systemd[1]: Stopped ignition-kargs.service. Feb 8 23:19:28.086823 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 8 23:19:28.086875 systemd[1]: Stopped ignition-setup.service. Feb 8 23:19:28.087311 systemd[1]: Stopping iscsiuio.service... Feb 8 23:19:28.090335 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 8 23:19:28.090411 systemd[1]: Stopped iscsiuio.service. Feb 8 23:19:28.090669 systemd[1]: Stopped target network.target. Feb 8 23:19:28.092225 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 8 23:19:28.092252 systemd[1]: Closed iscsiuio.socket. Feb 8 23:19:28.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.092739 systemd[1]: Stopping systemd-networkd.service... Feb 8 23:19:28.094260 systemd[1]: Stopping systemd-resolved.service... Feb 8 23:19:28.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.101631 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 8 23:19:28.101727 systemd[1]: Stopped systemd-resolved.service. Feb 8 23:19:28.102902 systemd-networkd[714]: eth0: DHCPv6 lease lost Feb 8 23:19:28.106000 audit: BPF prog-id=6 op=UNLOAD Feb 8 23:19:28.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.104033 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 8 23:19:28.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.109000 audit: BPF prog-id=9 op=UNLOAD Feb 8 23:19:28.104115 systemd[1]: Stopped systemd-networkd.service. Feb 8 23:19:28.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.105936 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 8 23:19:28.105966 systemd[1]: Closed systemd-networkd.socket. Feb 8 23:19:28.106808 systemd[1]: Stopping network-cleanup.service... Feb 8 23:19:28.108158 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 8 23:19:28.108206 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 8 23:19:28.108662 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 8 23:19:28.108697 systemd[1]: Stopped systemd-sysctl.service. Feb 8 23:19:28.110594 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 8 23:19:28.110640 systemd[1]: Stopped systemd-modules-load.service. Feb 8 23:19:28.114726 systemd[1]: Stopping systemd-udevd.service... Feb 8 23:19:28.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.116565 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 8 23:19:28.120164 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 8 23:19:28.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.120295 systemd[1]: Stopped network-cleanup.service. Feb 8 23:19:28.121658 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 8 23:19:28.121802 systemd[1]: Stopped systemd-udevd.service. Feb 8 23:19:28.124185 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 8 23:19:28.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.124230 systemd[1]: Closed systemd-udevd-control.socket. Feb 8 23:19:28.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.125426 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 8 23:19:28.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.125463 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 8 23:19:28.126953 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 8 23:19:28.126999 systemd[1]: Stopped dracut-pre-udev.service. Feb 8 23:19:28.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.128209 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 8 23:19:28.128254 systemd[1]: Stopped dracut-cmdline.service. Feb 8 23:19:28.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:28.129671 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 8 23:19:28.129715 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 8 23:19:28.130792 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 8 23:19:28.131692 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 8 23:19:28.131746 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 8 23:19:28.133666 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 8 23:19:28.134186 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 8 23:19:28.134284 systemd[1]: Stopped sysroot-boot.service. Feb 8 23:19:28.135834 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 8 23:19:28.135937 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 8 23:19:28.137128 systemd[1]: Reached target initrd-switch-root.target. Feb 8 23:19:28.138599 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 8 23:19:28.138648 systemd[1]: Stopped initrd-setup-root.service. Feb 8 23:19:28.140721 systemd[1]: Starting initrd-switch-root.service... Feb 8 23:19:28.156803 systemd[1]: Switching root. Feb 8 23:19:28.174177 systemd-journald[198]: Journal stopped Feb 8 23:19:31.597986 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Feb 8 23:19:31.598031 kernel: SELinux: Class mctp_socket not defined in policy. Feb 8 23:19:31.598046 kernel: SELinux: Class anon_inode not defined in policy. Feb 8 23:19:31.598058 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 8 23:19:31.598076 kernel: SELinux: policy capability network_peer_controls=1 Feb 8 23:19:31.598086 kernel: SELinux: policy capability open_perms=1 Feb 8 23:19:31.598098 kernel: SELinux: policy capability extended_socket_class=1 Feb 8 23:19:31.598108 kernel: SELinux: policy capability always_check_network=0 Feb 8 23:19:31.598117 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 8 23:19:31.598129 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 8 23:19:31.598138 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 8 23:19:31.598149 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 8 23:19:31.598159 systemd[1]: Successfully loaded SELinux policy in 36.234ms. Feb 8 23:19:31.598171 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.514ms. Feb 8 23:19:31.598182 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 8 23:19:31.598194 systemd[1]: Detected virtualization kvm. Feb 8 23:19:31.598204 systemd[1]: Detected architecture x86-64. Feb 8 23:19:31.598215 systemd[1]: Detected first boot. Feb 8 23:19:31.598226 systemd[1]: Initializing machine ID from VM UUID. Feb 8 23:19:31.598236 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 8 23:19:31.598248 systemd[1]: Populated /etc with preset unit settings. Feb 8 23:19:31.598259 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:19:31.598270 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:19:31.598281 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:19:31.598292 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 8 23:19:31.598302 systemd[1]: Stopped initrd-switch-root.service. Feb 8 23:19:31.598312 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 8 23:19:31.598324 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 8 23:19:31.598334 systemd[1]: Created slice system-addon\x2drun.slice. Feb 8 23:19:31.598344 systemd[1]: Created slice system-getty.slice. Feb 8 23:19:31.598354 systemd[1]: Created slice system-modprobe.slice. Feb 8 23:19:31.598364 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 8 23:19:31.598374 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 8 23:19:31.598384 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 8 23:19:31.598394 systemd[1]: Created slice user.slice. Feb 8 23:19:31.598406 systemd[1]: Started systemd-ask-password-console.path. Feb 8 23:19:31.598418 systemd[1]: Started systemd-ask-password-wall.path. Feb 8 23:19:31.598428 systemd[1]: Set up automount boot.automount. Feb 8 23:19:31.598438 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 8 23:19:31.598450 systemd[1]: Stopped target initrd-switch-root.target. Feb 8 23:19:31.598460 systemd[1]: Stopped target initrd-fs.target. Feb 8 23:19:31.598470 systemd[1]: Stopped target initrd-root-fs.target. Feb 8 23:19:31.598480 systemd[1]: Reached target integritysetup.target. Feb 8 23:19:31.598491 systemd[1]: Reached target remote-cryptsetup.target. Feb 8 23:19:31.598501 systemd[1]: Reached target remote-fs.target. Feb 8 23:19:31.598512 systemd[1]: Reached target slices.target. Feb 8 23:19:31.598522 systemd[1]: Reached target swap.target. Feb 8 23:19:31.598531 systemd[1]: Reached target torcx.target. Feb 8 23:19:31.598542 systemd[1]: Reached target veritysetup.target. Feb 8 23:19:31.598556 systemd[1]: Listening on systemd-coredump.socket. Feb 8 23:19:31.598570 systemd[1]: Listening on systemd-initctl.socket. Feb 8 23:19:31.598584 systemd[1]: Listening on systemd-networkd.socket. Feb 8 23:19:31.598595 systemd[1]: Listening on systemd-udevd-control.socket. Feb 8 23:19:31.598607 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 8 23:19:31.598620 systemd[1]: Listening on systemd-userdbd.socket. Feb 8 23:19:31.598635 systemd[1]: Mounting dev-hugepages.mount... Feb 8 23:19:31.598648 systemd[1]: Mounting dev-mqueue.mount... Feb 8 23:19:31.598664 systemd[1]: Mounting media.mount... Feb 8 23:19:31.598678 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 8 23:19:31.598692 systemd[1]: Mounting sys-kernel-debug.mount... Feb 8 23:19:31.598706 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 8 23:19:31.598720 systemd[1]: Mounting tmp.mount... Feb 8 23:19:31.598736 systemd[1]: Starting flatcar-tmpfiles.service... Feb 8 23:19:31.598750 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 8 23:19:31.598764 systemd[1]: Starting kmod-static-nodes.service... Feb 8 23:19:31.598777 systemd[1]: Starting modprobe@configfs.service... Feb 8 23:19:31.598792 systemd[1]: Starting modprobe@dm_mod.service... Feb 8 23:19:31.598805 systemd[1]: Starting modprobe@drm.service... Feb 8 23:19:31.598819 systemd[1]: Starting modprobe@efi_pstore.service... Feb 8 23:19:31.598835 systemd[1]: Starting modprobe@fuse.service... Feb 8 23:19:31.598850 systemd[1]: Starting modprobe@loop.service... Feb 8 23:19:31.598909 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 8 23:19:31.598924 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 8 23:19:31.598938 systemd[1]: Stopped systemd-fsck-root.service. Feb 8 23:19:31.598952 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 8 23:19:31.598966 systemd[1]: Stopped systemd-fsck-usr.service. Feb 8 23:19:31.598980 systemd[1]: Stopped systemd-journald.service. Feb 8 23:19:31.598993 kernel: loop: module loaded Feb 8 23:19:31.599007 systemd[1]: Starting systemd-journald.service... Feb 8 23:19:31.599020 kernel: fuse: init (API version 7.34) Feb 8 23:19:31.599035 systemd[1]: Starting systemd-modules-load.service... Feb 8 23:19:31.599049 systemd[1]: Starting systemd-network-generator.service... Feb 8 23:19:31.599063 systemd[1]: Starting systemd-remount-fs.service... Feb 8 23:19:31.599085 systemd[1]: Starting systemd-udev-trigger.service... Feb 8 23:19:31.599101 systemd[1]: verity-setup.service: Deactivated successfully. Feb 8 23:19:31.599115 systemd[1]: Stopped verity-setup.service. Feb 8 23:19:31.599130 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 8 23:19:31.599144 systemd[1]: Mounted dev-hugepages.mount. Feb 8 23:19:31.599158 systemd[1]: Mounted dev-mqueue.mount. Feb 8 23:19:31.599174 systemd[1]: Mounted media.mount. Feb 8 23:19:31.599190 systemd-journald[976]: Journal started Feb 8 23:19:31.599237 systemd-journald[976]: Runtime Journal (/run/log/journal/a2e1e2ff5458416986badd3b3f359120) is 6.0M, max 48.5M, 42.5M free. Feb 8 23:19:28.229000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 8 23:19:28.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 8 23:19:28.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 8 23:19:28.695000 audit: BPF prog-id=10 op=LOAD Feb 8 23:19:28.695000 audit: BPF prog-id=10 op=UNLOAD Feb 8 23:19:28.695000 audit: BPF prog-id=11 op=LOAD Feb 8 23:19:28.695000 audit: BPF prog-id=11 op=UNLOAD Feb 8 23:19:28.754000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 8 23:19:28.754000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000194722 a1=c0001849a8 a2=c00018cc80 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:28.754000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:19:28.755000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 8 23:19:28.755000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001947f9 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:28.755000 audit: CWD cwd="/" Feb 8 23:19:28.755000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:28.755000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:28.755000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:19:31.490000 audit: BPF prog-id=12 op=LOAD Feb 8 23:19:31.490000 audit: BPF prog-id=3 op=UNLOAD Feb 8 23:19:31.490000 audit: BPF prog-id=13 op=LOAD Feb 8 23:19:31.490000 audit: BPF prog-id=14 op=LOAD Feb 8 23:19:31.490000 audit: BPF prog-id=4 op=UNLOAD Feb 8 23:19:31.490000 audit: BPF prog-id=5 op=UNLOAD Feb 8 23:19:31.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.505000 audit: BPF prog-id=12 op=UNLOAD Feb 8 23:19:31.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.599959 systemd[1]: Mounted sys-kernel-debug.mount. Feb 8 23:19:31.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.575000 audit: BPF prog-id=15 op=LOAD Feb 8 23:19:31.575000 audit: BPF prog-id=16 op=LOAD Feb 8 23:19:31.575000 audit: BPF prog-id=17 op=LOAD Feb 8 23:19:31.575000 audit: BPF prog-id=13 op=UNLOAD Feb 8 23:19:31.575000 audit: BPF prog-id=14 op=UNLOAD Feb 8 23:19:31.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.595000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 8 23:19:31.595000 audit[976]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc63104190 a2=4000 a3=7ffc6310422c items=0 ppid=1 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:31.595000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 8 23:19:31.489556 systemd[1]: Queued start job for default target multi-user.target. Feb 8 23:19:28.753462 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:19:31.489566 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 8 23:19:28.753654 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 8 23:19:31.492445 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 8 23:19:28.753672 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 8 23:19:28.753725 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 8 23:19:28.753736 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 8 23:19:28.753768 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 8 23:19:28.753788 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 8 23:19:28.754044 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 8 23:19:28.754084 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 8 23:19:28.754100 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 8 23:19:28.754444 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 8 23:19:28.754486 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 8 23:19:28.754518 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 8 23:19:28.754536 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 8 23:19:28.754556 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 8 23:19:28.754574 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 8 23:19:31.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.601899 systemd[1]: Started systemd-journald.service. Feb 8 23:19:31.215549 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:31Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:19:31.601904 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 8 23:19:31.215822 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:31Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:19:31.215935 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:31Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:19:31.216112 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:31Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:19:31.216159 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:31Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 8 23:19:31.216223 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-08T23:19:31Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 8 23:19:31.602621 systemd[1]: Mounted tmp.mount. Feb 8 23:19:31.603349 systemd[1]: Finished kmod-static-nodes.service. Feb 8 23:19:31.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.604193 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 8 23:19:31.604315 systemd[1]: Finished modprobe@configfs.service. Feb 8 23:19:31.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.605128 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 8 23:19:31.605242 systemd[1]: Finished modprobe@dm_mod.service. Feb 8 23:19:31.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.606044 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 8 23:19:31.606166 systemd[1]: Finished modprobe@drm.service. Feb 8 23:19:31.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.606931 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 8 23:19:31.607034 systemd[1]: Finished modprobe@efi_pstore.service. Feb 8 23:19:31.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.607825 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 8 23:19:31.607951 systemd[1]: Finished modprobe@fuse.service. Feb 8 23:19:31.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.608681 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 8 23:19:31.608775 systemd[1]: Finished modprobe@loop.service. Feb 8 23:19:31.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.610517 systemd[1]: Finished systemd-modules-load.service. Feb 8 23:19:31.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.611528 systemd[1]: Finished flatcar-tmpfiles.service. Feb 8 23:19:31.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.612344 systemd[1]: Finished systemd-network-generator.service. Feb 8 23:19:31.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.613215 systemd[1]: Finished systemd-remount-fs.service. Feb 8 23:19:31.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.614195 systemd[1]: Reached target network-pre.target. Feb 8 23:19:31.615714 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 8 23:19:31.617163 systemd[1]: Mounting sys-kernel-config.mount... Feb 8 23:19:31.617697 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 8 23:19:31.618795 systemd[1]: Starting systemd-hwdb-update.service... Feb 8 23:19:31.620372 systemd[1]: Starting systemd-journal-flush.service... Feb 8 23:19:31.621137 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 8 23:19:31.621955 systemd[1]: Starting systemd-random-seed.service... Feb 8 23:19:31.622613 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 8 23:19:31.623485 systemd[1]: Starting systemd-sysctl.service... Feb 8 23:19:31.625100 systemd[1]: Starting systemd-sysusers.service... Feb 8 23:19:31.626227 systemd-journald[976]: Time spent on flushing to /var/log/journal/a2e1e2ff5458416986badd3b3f359120 is 20.319ms for 1101 entries. Feb 8 23:19:31.626227 systemd-journald[976]: System Journal (/var/log/journal/a2e1e2ff5458416986badd3b3f359120) is 8.0M, max 195.6M, 187.6M free. Feb 8 23:19:31.659765 systemd-journald[976]: Received client request to flush runtime journal. Feb 8 23:19:31.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.628230 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 8 23:19:31.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.630020 systemd[1]: Mounted sys-kernel-config.mount. Feb 8 23:19:31.631894 systemd[1]: Finished systemd-random-seed.service. Feb 8 23:19:31.632749 systemd[1]: Reached target first-boot-complete.target. Feb 8 23:19:31.641775 systemd[1]: Finished systemd-sysctl.service. Feb 8 23:19:31.645289 systemd[1]: Finished systemd-sysusers.service. Feb 8 23:19:31.659795 systemd[1]: Finished systemd-udev-trigger.service. Feb 8 23:19:31.661037 systemd[1]: Finished systemd-journal-flush.service. Feb 8 23:19:31.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:31.663571 systemd[1]: Starting systemd-udev-settle.service... Feb 8 23:19:31.670169 udevadm[1009]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 8 23:19:32.117245 systemd[1]: Finished systemd-hwdb-update.service. Feb 8 23:19:32.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.117000 audit: BPF prog-id=18 op=LOAD Feb 8 23:19:32.117000 audit: BPF prog-id=19 op=LOAD Feb 8 23:19:32.117000 audit: BPF prog-id=7 op=UNLOAD Feb 8 23:19:32.117000 audit: BPF prog-id=8 op=UNLOAD Feb 8 23:19:32.119207 systemd[1]: Starting systemd-udevd.service... Feb 8 23:19:32.133582 systemd-udevd[1010]: Using default interface naming scheme 'v252'. Feb 8 23:19:32.145074 systemd[1]: Started systemd-udevd.service. Feb 8 23:19:32.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.145000 audit: BPF prog-id=20 op=LOAD Feb 8 23:19:32.147997 systemd[1]: Starting systemd-networkd.service... Feb 8 23:19:32.153192 systemd[1]: Starting systemd-userdbd.service... Feb 8 23:19:32.151000 audit: BPF prog-id=21 op=LOAD Feb 8 23:19:32.151000 audit: BPF prog-id=22 op=LOAD Feb 8 23:19:32.151000 audit: BPF prog-id=23 op=LOAD Feb 8 23:19:32.170560 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 8 23:19:32.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.182352 systemd[1]: Started systemd-userdbd.service. Feb 8 23:19:32.208381 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 8 23:19:32.209117 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 8 23:19:32.213880 kernel: ACPI: button: Power Button [PWRF] Feb 8 23:19:32.227175 systemd-networkd[1019]: lo: Link UP Feb 8 23:19:32.227185 systemd-networkd[1019]: lo: Gained carrier Feb 8 23:19:32.227612 systemd-networkd[1019]: Enumeration completed Feb 8 23:19:32.227719 systemd[1]: Started systemd-networkd.service. Feb 8 23:19:32.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.230726 systemd-networkd[1019]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:19:32.232045 systemd-networkd[1019]: eth0: Link UP Feb 8 23:19:32.232061 systemd-networkd[1019]: eth0: Gained carrier Feb 8 23:19:32.225000 audit[1012]: AVC avc: denied { confidentiality } for pid=1012 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 8 23:19:32.225000 audit[1012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56246f99c6a0 a1=32194 a2=7f98f68d2bc5 a3=5 items=108 ppid=1010 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:32.225000 audit: CWD cwd="/" Feb 8 23:19:32.225000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=1 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=2 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=3 name=(null) inode=15747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=4 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=5 name=(null) inode=15748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=6 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=7 name=(null) inode=15749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=8 name=(null) inode=15749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=9 name=(null) inode=15750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=10 name=(null) inode=15749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=11 name=(null) inode=15751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=12 name=(null) inode=15749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=13 name=(null) inode=15752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=14 name=(null) inode=15749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=15 name=(null) inode=15753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=16 name=(null) inode=15749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=17 name=(null) inode=15754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=18 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=19 name=(null) inode=15755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=20 name=(null) inode=15755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=21 name=(null) inode=15756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=22 name=(null) inode=15755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=23 name=(null) inode=15757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=24 name=(null) inode=15755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=25 name=(null) inode=15758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=26 name=(null) inode=15755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=27 name=(null) inode=15759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=28 name=(null) inode=15755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=29 name=(null) inode=15760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=30 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=31 name=(null) inode=15761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=32 name=(null) inode=15761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=33 name=(null) inode=15762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=34 name=(null) inode=15761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=35 name=(null) inode=15763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=36 name=(null) inode=15761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=37 name=(null) inode=15764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=38 name=(null) inode=15761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=39 name=(null) inode=15765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=40 name=(null) inode=15761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=41 name=(null) inode=15766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=42 name=(null) inode=15746 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=43 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=44 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=45 name=(null) inode=15768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=46 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=47 name=(null) inode=15769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=48 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=49 name=(null) inode=15770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=50 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=51 name=(null) inode=15771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=52 name=(null) inode=15767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=53 name=(null) inode=15772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=55 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=56 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=57 name=(null) inode=15774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=58 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=59 name=(null) inode=15775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=60 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=61 name=(null) inode=15776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=62 name=(null) inode=15776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=63 name=(null) inode=15777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=64 name=(null) inode=15776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=65 name=(null) inode=15778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=66 name=(null) inode=15776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=67 name=(null) inode=15779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=68 name=(null) inode=15776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=69 name=(null) inode=15780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=70 name=(null) inode=15776 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=71 name=(null) inode=15781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=72 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=73 name=(null) inode=15782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=74 name=(null) inode=15782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=75 name=(null) inode=15783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=76 name=(null) inode=15782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=77 name=(null) inode=15784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=78 name=(null) inode=15782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=79 name=(null) inode=15785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=80 name=(null) inode=15782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=81 name=(null) inode=15786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=82 name=(null) inode=15782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=83 name=(null) inode=15787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=84 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=85 name=(null) inode=15788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=86 name=(null) inode=15788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=87 name=(null) inode=15789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=88 name=(null) inode=15788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=89 name=(null) inode=15790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=90 name=(null) inode=15788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=91 name=(null) inode=15791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=92 name=(null) inode=15788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=93 name=(null) inode=15792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=94 name=(null) inode=15788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=95 name=(null) inode=15793 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=96 name=(null) inode=15773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=97 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=98 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=99 name=(null) inode=15795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=100 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=101 name=(null) inode=15796 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=102 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=103 name=(null) inode=15797 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=104 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=105 name=(null) inode=15798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=106 name=(null) inode=15794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PATH item=107 name=(null) inode=15799 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:19:32.225000 audit: PROCTITLE proctitle="(udev-worker)" Feb 8 23:19:32.242990 systemd-networkd[1019]: eth0: DHCPv4 address 10.0.0.51/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 8 23:19:32.247874 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 8 23:19:32.251877 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 8 23:19:32.261880 kernel: mousedev: PS/2 mouse device common for all mice Feb 8 23:19:32.322188 kernel: kvm: Nested Virtualization enabled Feb 8 23:19:32.322301 kernel: SVM: kvm: Nested Paging enabled Feb 8 23:19:32.322316 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 8 23:19:32.323009 kernel: SVM: Virtual GIF supported Feb 8 23:19:32.335873 kernel: EDAC MC: Ver: 3.0.0 Feb 8 23:19:32.361203 systemd[1]: Finished systemd-udev-settle.service. Feb 8 23:19:32.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.363147 systemd[1]: Starting lvm2-activation-early.service... Feb 8 23:19:32.369815 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 8 23:19:32.396672 systemd[1]: Finished lvm2-activation-early.service. Feb 8 23:19:32.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.397488 systemd[1]: Reached target cryptsetup.target. Feb 8 23:19:32.399190 systemd[1]: Starting lvm2-activation.service... Feb 8 23:19:32.402573 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 8 23:19:32.429946 systemd[1]: Finished lvm2-activation.service. Feb 8 23:19:32.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.430757 systemd[1]: Reached target local-fs-pre.target. Feb 8 23:19:32.431380 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 8 23:19:32.431410 systemd[1]: Reached target local-fs.target. Feb 8 23:19:32.432000 systemd[1]: Reached target machines.target. Feb 8 23:19:32.433781 systemd[1]: Starting ldconfig.service... Feb 8 23:19:32.434540 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 8 23:19:32.434585 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:19:32.435377 systemd[1]: Starting systemd-boot-update.service... Feb 8 23:19:32.436953 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 8 23:19:32.438821 systemd[1]: Starting systemd-machine-id-commit.service... Feb 8 23:19:32.439663 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 8 23:19:32.439712 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 8 23:19:32.440990 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 8 23:19:32.442444 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1049 (bootctl) Feb 8 23:19:32.443896 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 8 23:19:32.451040 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 8 23:19:32.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.456293 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 8 23:19:32.458937 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 8 23:19:32.463099 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 8 23:19:32.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.631459 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 8 23:19:32.632138 systemd[1]: Finished systemd-machine-id-commit.service. Feb 8 23:19:32.638810 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) Feb 8 23:19:32.638810 systemd-fsck[1058]: /dev/vda1: 789 files, 115332/258078 clusters Feb 8 23:19:32.641095 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 8 23:19:32.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.644282 systemd[1]: Mounting boot.mount... Feb 8 23:19:32.666464 systemd[1]: Mounted boot.mount. Feb 8 23:19:32.681540 systemd[1]: Finished systemd-boot-update.service. Feb 8 23:19:32.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.729545 ldconfig[1048]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 8 23:19:32.735685 systemd[1]: Finished ldconfig.service. Feb 8 23:19:32.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.740666 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 8 23:19:32.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.742740 systemd[1]: Starting audit-rules.service... Feb 8 23:19:32.744358 systemd[1]: Starting clean-ca-certificates.service... Feb 8 23:19:32.746211 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 8 23:19:32.746000 audit: BPF prog-id=24 op=LOAD Feb 8 23:19:32.748568 systemd[1]: Starting systemd-resolved.service... Feb 8 23:19:32.749000 audit: BPF prog-id=25 op=LOAD Feb 8 23:19:32.750850 systemd[1]: Starting systemd-timesyncd.service... Feb 8 23:19:32.753274 systemd[1]: Starting systemd-update-utmp.service... Feb 8 23:19:32.754536 systemd[1]: Finished clean-ca-certificates.service. Feb 8 23:19:32.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.755787 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 8 23:19:32.758000 audit[1072]: SYSTEM_BOOT pid=1072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.762350 systemd[1]: Finished systemd-update-utmp.service. Feb 8 23:19:32.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.769118 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 8 23:19:32.771206 systemd[1]: Starting systemd-update-done.service... Feb 8 23:19:32.779175 systemd[1]: Finished systemd-update-done.service. Feb 8 23:19:32.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:32.786000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 8 23:19:32.786000 audit[1082]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe388aa000 a2=420 a3=0 items=0 ppid=1061 pid=1082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:32.786000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 8 23:19:32.787451 augenrules[1082]: No rules Feb 8 23:19:32.787993 systemd[1]: Finished audit-rules.service. Feb 8 23:19:32.803969 systemd[1]: Started systemd-timesyncd.service. Feb 8 23:19:32.804958 systemd[1]: Reached target time-set.target. Feb 8 23:19:32.805128 systemd-timesyncd[1068]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 8 23:19:32.805182 systemd-timesyncd[1068]: Initial clock synchronization to Thu 2024-02-08 23:19:32.771822 UTC. Feb 8 23:19:32.810211 systemd-resolved[1065]: Positive Trust Anchors: Feb 8 23:19:32.810229 systemd-resolved[1065]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 8 23:19:32.810265 systemd-resolved[1065]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 8 23:19:32.818968 systemd-resolved[1065]: Defaulting to hostname 'linux'. Feb 8 23:19:32.820480 systemd[1]: Started systemd-resolved.service. Feb 8 23:19:32.821223 systemd[1]: Reached target network.target. Feb 8 23:19:32.821793 systemd[1]: Reached target nss-lookup.target. Feb 8 23:19:32.822411 systemd[1]: Reached target sysinit.target. Feb 8 23:19:32.823085 systemd[1]: Started motdgen.path. Feb 8 23:19:32.823627 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 8 23:19:32.824572 systemd[1]: Started logrotate.timer. Feb 8 23:19:32.825215 systemd[1]: Started mdadm.timer. Feb 8 23:19:32.825742 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 8 23:19:32.826385 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 8 23:19:32.826407 systemd[1]: Reached target paths.target. Feb 8 23:19:32.826960 systemd[1]: Reached target timers.target. Feb 8 23:19:32.827820 systemd[1]: Listening on dbus.socket. Feb 8 23:19:32.829368 systemd[1]: Starting docker.socket... Feb 8 23:19:32.832205 systemd[1]: Listening on sshd.socket. Feb 8 23:19:32.832835 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:19:32.833185 systemd[1]: Listening on docker.socket. Feb 8 23:19:32.833795 systemd[1]: Reached target sockets.target. Feb 8 23:19:32.834385 systemd[1]: Reached target basic.target. Feb 8 23:19:32.834996 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 8 23:19:32.835018 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 8 23:19:32.835779 systemd[1]: Starting containerd.service... Feb 8 23:19:32.837222 systemd[1]: Starting dbus.service... Feb 8 23:19:32.838647 systemd[1]: Starting enable-oem-cloudinit.service... Feb 8 23:19:32.840320 systemd[1]: Starting extend-filesystems.service... Feb 8 23:19:32.841073 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 8 23:19:32.842191 systemd[1]: Starting motdgen.service... Feb 8 23:19:32.844411 systemd[1]: Starting prepare-cni-plugins.service... Feb 8 23:19:32.846013 jq[1092]: false Feb 8 23:19:32.846578 systemd[1]: Starting prepare-critools.service... Feb 8 23:19:32.848559 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 8 23:19:32.850639 systemd[1]: Starting sshd-keygen.service... Feb 8 23:19:32.869472 systemd[1]: Starting systemd-logind.service... Feb 8 23:19:32.871249 extend-filesystems[1093]: Found sr0 Feb 8 23:19:32.872749 extend-filesystems[1093]: Found vda Feb 8 23:19:32.872749 extend-filesystems[1093]: Found vda1 Feb 8 23:19:32.872749 extend-filesystems[1093]: Found vda2 Feb 8 23:19:32.872749 extend-filesystems[1093]: Found vda3 Feb 8 23:19:32.872749 extend-filesystems[1093]: Found usr Feb 8 23:19:32.872749 extend-filesystems[1093]: Found vda4 Feb 8 23:19:32.872749 extend-filesystems[1093]: Found vda6 Feb 8 23:19:32.872749 extend-filesystems[1093]: Found vda7 Feb 8 23:19:32.872749 extend-filesystems[1093]: Found vda9 Feb 8 23:19:32.872749 extend-filesystems[1093]: Checking size of /dev/vda9 Feb 8 23:19:32.872642 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:19:32.872710 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 8 23:19:32.876537 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 8 23:19:32.894826 dbus-daemon[1091]: [system] SELinux support is enabled Feb 8 23:19:32.897680 jq[1114]: true Feb 8 23:19:32.880054 systemd[1]: Starting update-engine.service... Feb 8 23:19:32.891416 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 8 23:19:32.895455 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 8 23:19:32.895714 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 8 23:19:32.895953 systemd[1]: Started dbus.service. Feb 8 23:19:32.901489 systemd[1]: motdgen.service: Deactivated successfully. Feb 8 23:19:32.901730 systemd[1]: Finished motdgen.service. Feb 8 23:19:32.902633 extend-filesystems[1093]: Resized partition /dev/vda9 Feb 8 23:19:32.905378 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 8 23:19:32.905650 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 8 23:19:32.913460 jq[1124]: true Feb 8 23:19:32.917649 tar[1120]: ./ Feb 8 23:19:32.917649 tar[1120]: ./loopback Feb 8 23:19:32.916581 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 8 23:19:32.916613 systemd[1]: Reached target system-config.target. Feb 8 23:19:32.917592 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 8 23:19:32.917615 systemd[1]: Reached target user-config.target. Feb 8 23:19:32.922605 tar[1121]: crictl Feb 8 23:19:32.922912 extend-filesystems[1119]: resize2fs 1.46.5 (30-Dec-2021) Feb 8 23:19:32.926883 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 8 23:19:32.968904 update_engine[1113]: I0208 23:19:32.968670 1113 main.cc:92] Flatcar Update Engine starting Feb 8 23:19:32.972659 systemd[1]: Started update-engine.service. Feb 8 23:19:32.972833 update_engine[1113]: I0208 23:19:32.972780 1113 update_check_scheduler.cc:74] Next update check in 8m2s Feb 8 23:19:32.974649 systemd-logind[1107]: Watching system buttons on /dev/input/event1 (Power Button) Feb 8 23:19:32.974682 systemd-logind[1107]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 8 23:19:32.975834 systemd-logind[1107]: New seat seat0. Feb 8 23:19:32.976313 systemd[1]: Started locksmithd.service. Feb 8 23:19:32.981489 systemd[1]: Started systemd-logind.service. Feb 8 23:19:32.989880 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 8 23:19:33.013063 extend-filesystems[1119]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 8 23:19:33.013063 extend-filesystems[1119]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 8 23:19:33.013063 extend-filesystems[1119]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 8 23:19:33.022113 extend-filesystems[1093]: Resized filesystem in /dev/vda9 Feb 8 23:19:33.023102 bash[1145]: Updated "/home/core/.ssh/authorized_keys" Feb 8 23:19:33.023224 env[1125]: time="2024-02-08T23:19:33.014387419Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 8 23:19:33.016799 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 8 23:19:33.017019 systemd[1]: Finished extend-filesystems.service. Feb 8 23:19:33.023330 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 8 23:19:33.068759 env[1125]: time="2024-02-08T23:19:33.068677643Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 8 23:19:33.068961 env[1125]: time="2024-02-08T23:19:33.068936311Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:19:33.078622 env[1125]: time="2024-02-08T23:19:33.078566333Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:19:33.078622 env[1125]: time="2024-02-08T23:19:33.078609494Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:19:33.078932 env[1125]: time="2024-02-08T23:19:33.078897676Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:19:33.078932 env[1125]: time="2024-02-08T23:19:33.078927500Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 8 23:19:33.079024 env[1125]: time="2024-02-08T23:19:33.078943497Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 8 23:19:33.079024 env[1125]: time="2024-02-08T23:19:33.078955814Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 8 23:19:33.079094 env[1125]: time="2024-02-08T23:19:33.079065672Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:19:33.079365 env[1125]: time="2024-02-08T23:19:33.079334477Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:19:33.079508 env[1125]: time="2024-02-08T23:19:33.079477048Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:19:33.079508 env[1125]: time="2024-02-08T23:19:33.079502453Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 8 23:19:33.079600 env[1125]: time="2024-02-08T23:19:33.079564701Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 8 23:19:33.079600 env[1125]: time="2024-02-08T23:19:33.079579867Z" level=info msg="metadata content store policy set" policy=shared Feb 8 23:19:33.079813 tar[1120]: ./bandwidth Feb 8 23:19:33.086420 env[1125]: time="2024-02-08T23:19:33.086378782Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 8 23:19:33.086420 env[1125]: time="2024-02-08T23:19:33.086420573Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 8 23:19:33.086541 env[1125]: time="2024-02-08T23:19:33.086436601Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 8 23:19:33.086541 env[1125]: time="2024-02-08T23:19:33.086473863Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.086541 env[1125]: time="2024-02-08T23:19:33.086502547Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.086541 env[1125]: time="2024-02-08T23:19:33.086519664Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.086541 env[1125]: time="2024-02-08T23:19:33.086534091Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.086665 env[1125]: time="2024-02-08T23:19:33.086549578Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.086665 env[1125]: time="2024-02-08T23:19:33.086565834Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.086665 env[1125]: time="2024-02-08T23:19:33.086581181Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.086665 env[1125]: time="2024-02-08T23:19:33.086596868Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.086665 env[1125]: time="2024-02-08T23:19:33.086610535Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 8 23:19:33.086805 env[1125]: time="2024-02-08T23:19:33.086721993Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 8 23:19:33.086834 env[1125]: time="2024-02-08T23:19:33.086813834Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 8 23:19:33.087123 env[1125]: time="2024-02-08T23:19:33.087091218Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 8 23:19:33.087190 env[1125]: time="2024-02-08T23:19:33.087129790Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087190 env[1125]: time="2024-02-08T23:19:33.087146877Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 8 23:19:33.087245 env[1125]: time="2024-02-08T23:19:33.087200126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087245 env[1125]: time="2024-02-08T23:19:33.087216152Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087245 env[1125]: time="2024-02-08T23:19:33.087230380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087245 env[1125]: time="2024-02-08T23:19:33.087243807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087350 env[1125]: time="2024-02-08T23:19:33.087259363Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087350 env[1125]: time="2024-02-08T23:19:33.087275730Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087350 env[1125]: time="2024-02-08T23:19:33.087289137Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087350 env[1125]: time="2024-02-08T23:19:33.087302486Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087350 env[1125]: time="2024-02-08T23:19:33.087317222Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 8 23:19:33.087487 env[1125]: time="2024-02-08T23:19:33.087452195Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087487 env[1125]: time="2024-02-08T23:19:33.087470751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087487 env[1125]: time="2024-02-08T23:19:33.087485208Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087584 env[1125]: time="2024-02-08T23:19:33.087500006Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 8 23:19:33.087584 env[1125]: time="2024-02-08T23:19:33.087518941Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 8 23:19:33.087584 env[1125]: time="2024-02-08T23:19:33.087531649Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 8 23:19:33.087584 env[1125]: time="2024-02-08T23:19:33.087551065Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 8 23:19:33.087700 env[1125]: time="2024-02-08T23:19:33.087587238Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 8 23:19:33.087911 env[1125]: time="2024-02-08T23:19:33.087814401Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 8 23:19:33.087911 env[1125]: time="2024-02-08T23:19:33.087908893Z" level=info msg="Connect containerd service" Feb 8 23:19:33.088946 env[1125]: time="2024-02-08T23:19:33.087951703Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 8 23:19:33.088946 env[1125]: time="2024-02-08T23:19:33.088530507Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 8 23:19:33.088946 env[1125]: time="2024-02-08T23:19:33.088840914Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 8 23:19:33.088946 env[1125]: time="2024-02-08T23:19:33.088904481Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 8 23:19:33.089071 env[1125]: time="2024-02-08T23:19:33.088957231Z" level=info msg="containerd successfully booted in 0.075487s" Feb 8 23:19:33.089072 systemd[1]: Started containerd.service. Feb 8 23:19:33.092931 env[1125]: time="2024-02-08T23:19:33.092875887Z" level=info msg="Start subscribing containerd event" Feb 8 23:19:33.093021 env[1125]: time="2024-02-08T23:19:33.092957741Z" level=info msg="Start recovering state" Feb 8 23:19:33.093058 env[1125]: time="2024-02-08T23:19:33.093037375Z" level=info msg="Start event monitor" Feb 8 23:19:33.093087 env[1125]: time="2024-02-08T23:19:33.093059051Z" level=info msg="Start snapshots syncer" Feb 8 23:19:33.093087 env[1125]: time="2024-02-08T23:19:33.093076297Z" level=info msg="Start cni network conf syncer for default" Feb 8 23:19:33.093138 env[1125]: time="2024-02-08T23:19:33.093087684Z" level=info msg="Start streaming server" Feb 8 23:19:33.168209 tar[1120]: ./ptp Feb 8 23:19:33.187673 locksmithd[1138]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 8 23:19:33.210147 tar[1120]: ./vlan Feb 8 23:19:33.250189 tar[1120]: ./host-device Feb 8 23:19:33.280453 tar[1120]: ./tuning Feb 8 23:19:33.306930 tar[1120]: ./vrf Feb 8 23:19:33.353510 tar[1120]: ./sbr Feb 8 23:19:33.386153 tar[1120]: ./tap Feb 8 23:19:33.436995 tar[1120]: ./dhcp Feb 8 23:19:33.558699 sshd_keygen[1111]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 8 23:19:33.572739 tar[1120]: ./static Feb 8 23:19:33.579454 systemd[1]: Finished sshd-keygen.service. Feb 8 23:19:33.581946 systemd[1]: Starting issuegen.service... Feb 8 23:19:33.586839 systemd[1]: issuegen.service: Deactivated successfully. Feb 8 23:19:33.587029 systemd[1]: Finished issuegen.service. Feb 8 23:19:33.589295 systemd[1]: Starting systemd-user-sessions.service... Feb 8 23:19:33.594228 systemd[1]: Finished systemd-user-sessions.service. Feb 8 23:19:33.597667 systemd[1]: Started getty@tty1.service. Feb 8 23:19:33.601478 tar[1120]: ./firewall Feb 8 23:19:33.600071 systemd[1]: Started serial-getty@ttyS0.service. Feb 8 23:19:33.601106 systemd[1]: Reached target getty.target. Feb 8 23:19:33.621462 systemd[1]: Finished prepare-critools.service. Feb 8 23:19:33.633984 tar[1120]: ./macvlan Feb 8 23:19:33.664254 tar[1120]: ./dummy Feb 8 23:19:33.694432 tar[1120]: ./bridge Feb 8 23:19:33.731194 tar[1120]: ./ipvlan Feb 8 23:19:33.766019 systemd-networkd[1019]: eth0: Gained IPv6LL Feb 8 23:19:33.766316 tar[1120]: ./portmap Feb 8 23:19:33.794595 tar[1120]: ./host-local Feb 8 23:19:33.828386 systemd[1]: Finished prepare-cni-plugins.service. Feb 8 23:19:33.829451 systemd[1]: Reached target multi-user.target. Feb 8 23:19:33.831313 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 8 23:19:33.837262 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 8 23:19:33.837391 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 8 23:19:33.838214 systemd[1]: Startup finished in 692ms (kernel) + 5.384s (initrd) + 5.645s (userspace) = 11.723s. Feb 8 23:19:42.288215 systemd[1]: Created slice system-sshd.slice. Feb 8 23:19:42.289275 systemd[1]: Started sshd@0-10.0.0.51:22-10.0.0.1:42006.service. Feb 8 23:19:42.322746 sshd[1176]: Accepted publickey for core from 10.0.0.1 port 42006 ssh2: RSA SHA256:ZIzHIduQp2k+ZJQKyG+d10ckdlQJVNUpLoHdM3Iys8s Feb 8 23:19:42.324077 sshd[1176]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:19:42.331522 systemd[1]: Created slice user-500.slice. Feb 8 23:19:42.332631 systemd[1]: Starting user-runtime-dir@500.service... Feb 8 23:19:42.334093 systemd-logind[1107]: New session 1 of user core. Feb 8 23:19:42.341397 systemd[1]: Finished user-runtime-dir@500.service. Feb 8 23:19:42.342581 systemd[1]: Starting user@500.service... Feb 8 23:19:42.345634 (systemd)[1179]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:19:42.410922 systemd[1179]: Queued start job for default target default.target. Feb 8 23:19:42.411335 systemd[1179]: Reached target paths.target. Feb 8 23:19:42.411350 systemd[1179]: Reached target sockets.target. Feb 8 23:19:42.411361 systemd[1179]: Reached target timers.target. Feb 8 23:19:42.411371 systemd[1179]: Reached target basic.target. Feb 8 23:19:42.411406 systemd[1179]: Reached target default.target. Feb 8 23:19:42.411429 systemd[1179]: Startup finished in 60ms. Feb 8 23:19:42.411520 systemd[1]: Started user@500.service. Feb 8 23:19:42.412551 systemd[1]: Started session-1.scope. Feb 8 23:19:42.462467 systemd[1]: Started sshd@1-10.0.0.51:22-10.0.0.1:42020.service. Feb 8 23:19:42.493098 sshd[1188]: Accepted publickey for core from 10.0.0.1 port 42020 ssh2: RSA SHA256:ZIzHIduQp2k+ZJQKyG+d10ckdlQJVNUpLoHdM3Iys8s Feb 8 23:19:42.494157 sshd[1188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:19:42.497541 systemd-logind[1107]: New session 2 of user core. Feb 8 23:19:42.498368 systemd[1]: Started session-2.scope. Feb 8 23:19:42.551249 sshd[1188]: pam_unix(sshd:session): session closed for user core Feb 8 23:19:42.553616 systemd[1]: sshd@1-10.0.0.51:22-10.0.0.1:42020.service: Deactivated successfully. Feb 8 23:19:42.554176 systemd[1]: session-2.scope: Deactivated successfully. Feb 8 23:19:42.554623 systemd-logind[1107]: Session 2 logged out. Waiting for processes to exit. Feb 8 23:19:42.555968 systemd[1]: Started sshd@2-10.0.0.51:22-10.0.0.1:42022.service. Feb 8 23:19:42.556644 systemd-logind[1107]: Removed session 2. Feb 8 23:19:42.585869 sshd[1194]: Accepted publickey for core from 10.0.0.1 port 42022 ssh2: RSA SHA256:ZIzHIduQp2k+ZJQKyG+d10ckdlQJVNUpLoHdM3Iys8s Feb 8 23:19:42.586839 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:19:42.589725 systemd-logind[1107]: New session 3 of user core. Feb 8 23:19:42.590489 systemd[1]: Started session-3.scope. Feb 8 23:19:42.638728 sshd[1194]: pam_unix(sshd:session): session closed for user core Feb 8 23:19:42.641447 systemd[1]: sshd@2-10.0.0.51:22-10.0.0.1:42022.service: Deactivated successfully. Feb 8 23:19:42.641952 systemd[1]: session-3.scope: Deactivated successfully. Feb 8 23:19:42.642401 systemd-logind[1107]: Session 3 logged out. Waiting for processes to exit. Feb 8 23:19:42.643440 systemd[1]: Started sshd@3-10.0.0.51:22-10.0.0.1:42032.service. Feb 8 23:19:42.644074 systemd-logind[1107]: Removed session 3. Feb 8 23:19:42.676066 sshd[1200]: Accepted publickey for core from 10.0.0.1 port 42032 ssh2: RSA SHA256:ZIzHIduQp2k+ZJQKyG+d10ckdlQJVNUpLoHdM3Iys8s Feb 8 23:19:42.677322 sshd[1200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:19:42.680283 systemd-logind[1107]: New session 4 of user core. Feb 8 23:19:42.680941 systemd[1]: Started session-4.scope. Feb 8 23:19:42.735809 sshd[1200]: pam_unix(sshd:session): session closed for user core Feb 8 23:19:42.738979 systemd[1]: sshd@3-10.0.0.51:22-10.0.0.1:42032.service: Deactivated successfully. Feb 8 23:19:42.739525 systemd[1]: session-4.scope: Deactivated successfully. Feb 8 23:19:42.740043 systemd-logind[1107]: Session 4 logged out. Waiting for processes to exit. Feb 8 23:19:42.741098 systemd[1]: Started sshd@4-10.0.0.51:22-10.0.0.1:42036.service. Feb 8 23:19:42.741771 systemd-logind[1107]: Removed session 4. Feb 8 23:19:42.771964 sshd[1206]: Accepted publickey for core from 10.0.0.1 port 42036 ssh2: RSA SHA256:ZIzHIduQp2k+ZJQKyG+d10ckdlQJVNUpLoHdM3Iys8s Feb 8 23:19:42.772966 sshd[1206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:19:42.776124 systemd-logind[1107]: New session 5 of user core. Feb 8 23:19:42.776819 systemd[1]: Started session-5.scope. Feb 8 23:19:42.831308 sudo[1209]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 8 23:19:42.831488 sudo[1209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:19:42.841063 dbus-daemon[1091]: \xd0]\u0012?\u0013V: received setenforce notice (enforcing=1635662000) Feb 8 23:19:42.843159 sudo[1209]: pam_unix(sudo:session): session closed for user root Feb 8 23:19:42.844838 sshd[1206]: pam_unix(sshd:session): session closed for user core Feb 8 23:19:42.848372 systemd[1]: Started sshd@5-10.0.0.51:22-10.0.0.1:42042.service. Feb 8 23:19:42.848887 systemd[1]: sshd@4-10.0.0.51:22-10.0.0.1:42036.service: Deactivated successfully. Feb 8 23:19:42.849555 systemd[1]: session-5.scope: Deactivated successfully. Feb 8 23:19:42.850093 systemd-logind[1107]: Session 5 logged out. Waiting for processes to exit. Feb 8 23:19:42.850810 systemd-logind[1107]: Removed session 5. Feb 8 23:19:42.880483 sshd[1212]: Accepted publickey for core from 10.0.0.1 port 42042 ssh2: RSA SHA256:ZIzHIduQp2k+ZJQKyG+d10ckdlQJVNUpLoHdM3Iys8s Feb 8 23:19:42.881682 sshd[1212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:19:42.885455 systemd-logind[1107]: New session 6 of user core. Feb 8 23:19:42.886424 systemd[1]: Started session-6.scope. Feb 8 23:19:42.940202 sudo[1217]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 8 23:19:42.940400 sudo[1217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:19:42.943390 sudo[1217]: pam_unix(sudo:session): session closed for user root Feb 8 23:19:42.947847 sudo[1216]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 8 23:19:42.948047 sudo[1216]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:19:42.957236 systemd[1]: Stopping audit-rules.service... Feb 8 23:19:42.957000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 8 23:19:42.958700 auditctl[1220]: No rules Feb 8 23:19:42.959087 systemd[1]: audit-rules.service: Deactivated successfully. Feb 8 23:19:42.959171 kernel: kauditd_printk_skb: 236 callbacks suppressed Feb 8 23:19:42.959210 kernel: audit: type=1305 audit(1707434382.957:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 8 23:19:42.959250 systemd[1]: Stopped audit-rules.service. Feb 8 23:19:42.957000 audit[1220]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc88aad870 a2=420 a3=0 items=0 ppid=1 pid=1220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:42.960795 systemd[1]: Starting audit-rules.service... Feb 8 23:19:42.963771 kernel: audit: type=1300 audit(1707434382.957:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc88aad870 a2=420 a3=0 items=0 ppid=1 pid=1220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:42.963820 kernel: audit: type=1327 audit(1707434382.957:158): proctitle=2F7362696E2F617564697463746C002D44 Feb 8 23:19:42.957000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 8 23:19:42.964726 kernel: audit: type=1131 audit(1707434382.958:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.978468 augenrules[1237]: No rules Feb 8 23:19:42.979247 systemd[1]: Finished audit-rules.service. Feb 8 23:19:42.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.980172 sudo[1216]: pam_unix(sudo:session): session closed for user root Feb 8 23:19:42.978000 audit[1216]: USER_END pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.981638 sshd[1212]: pam_unix(sshd:session): session closed for user core Feb 8 23:19:42.985898 kernel: audit: type=1130 audit(1707434382.978:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.986041 kernel: audit: type=1106 audit(1707434382.978:161): pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.986077 kernel: audit: type=1104 audit(1707434382.978:162): pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.978000 audit[1216]: CRED_DISP pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.985220 systemd[1]: Started sshd@6-10.0.0.51:22-10.0.0.1:42052.service. Feb 8 23:19:42.985703 systemd[1]: sshd@5-10.0.0.51:22-10.0.0.1:42042.service: Deactivated successfully. Feb 8 23:19:42.986642 systemd[1]: session-6.scope: Deactivated successfully. Feb 8 23:19:42.981000 audit[1212]: USER_END pid=1212 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:42.987409 systemd-logind[1107]: Session 6 logged out. Waiting for processes to exit. Feb 8 23:19:42.988563 systemd-logind[1107]: Removed session 6. Feb 8 23:19:42.989894 kernel: audit: type=1106 audit(1707434382.981:163): pid=1212 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:42.989940 kernel: audit: type=1104 audit(1707434382.981:164): pid=1212 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:42.981000 audit[1212]: CRED_DISP pid=1212 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:42.992275 kernel: audit: type=1130 audit(1707434382.984:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.51:22-10.0.0.1:42052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.51:22-10.0.0.1:42052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:42.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.51:22-10.0.0.1:42042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:43.017000 audit[1242]: USER_ACCT pid=1242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:43.018734 sshd[1242]: Accepted publickey for core from 10.0.0.1 port 42052 ssh2: RSA SHA256:ZIzHIduQp2k+ZJQKyG+d10ckdlQJVNUpLoHdM3Iys8s Feb 8 23:19:43.018000 audit[1242]: CRED_ACQ pid=1242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:43.018000 audit[1242]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdff748590 a2=3 a3=0 items=0 ppid=1 pid=1242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:43.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:19:43.019975 sshd[1242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:19:43.023574 systemd-logind[1107]: New session 7 of user core. Feb 8 23:19:43.024473 systemd[1]: Started session-7.scope. Feb 8 23:19:43.027000 audit[1242]: USER_START pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:43.029000 audit[1245]: CRED_ACQ pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:43.080000 audit[1246]: USER_ACCT pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:43.080000 audit[1246]: CRED_REFR pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:43.081714 sudo[1246]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 8 23:19:43.081906 sudo[1246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:19:43.082000 audit[1246]: USER_START pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:43.594644 systemd[1]: Reloading. Feb 8 23:19:43.658610 /usr/lib/systemd/system-generators/torcx-generator[1276]: time="2024-02-08T23:19:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:19:43.658636 /usr/lib/systemd/system-generators/torcx-generator[1276]: time="2024-02-08T23:19:43Z" level=info msg="torcx already run" Feb 8 23:19:43.722704 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:19:43.722723 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:19:43.744475 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit: BPF prog-id=31 op=LOAD Feb 8 23:19:43.808000 audit: BPF prog-id=15 op=UNLOAD Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit: BPF prog-id=32 op=LOAD Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.808000 audit: BPF prog-id=33 op=LOAD Feb 8 23:19:43.808000 audit: BPF prog-id=16 op=UNLOAD Feb 8 23:19:43.808000 audit: BPF prog-id=17 op=UNLOAD Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit: BPF prog-id=34 op=LOAD Feb 8 23:19:43.810000 audit: BPF prog-id=26 op=UNLOAD Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit: BPF prog-id=35 op=LOAD Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.810000 audit: BPF prog-id=36 op=LOAD Feb 8 23:19:43.810000 audit: BPF prog-id=27 op=UNLOAD Feb 8 23:19:43.811000 audit: BPF prog-id=28 op=UNLOAD Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit: BPF prog-id=37 op=LOAD Feb 8 23:19:43.814000 audit: BPF prog-id=25 op=UNLOAD Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit: BPF prog-id=38 op=LOAD Feb 8 23:19:43.815000 audit: BPF prog-id=21 op=UNLOAD Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit: BPF prog-id=39 op=LOAD Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.815000 audit: BPF prog-id=40 op=LOAD Feb 8 23:19:43.815000 audit: BPF prog-id=22 op=UNLOAD Feb 8 23:19:43.815000 audit: BPF prog-id=23 op=UNLOAD Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit: BPF prog-id=41 op=LOAD Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.816000 audit: BPF prog-id=42 op=LOAD Feb 8 23:19:43.816000 audit: BPF prog-id=18 op=UNLOAD Feb 8 23:19:43.816000 audit: BPF prog-id=19 op=UNLOAD Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit: BPF prog-id=43 op=LOAD Feb 8 23:19:43.817000 audit: BPF prog-id=20 op=UNLOAD Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit: BPF prog-id=44 op=LOAD Feb 8 23:19:43.818000 audit: BPF prog-id=24 op=UNLOAD Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:43.818000 audit: BPF prog-id=45 op=LOAD Feb 8 23:19:43.818000 audit: BPF prog-id=29 op=UNLOAD Feb 8 23:19:43.830111 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 8 23:19:43.834843 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 8 23:19:43.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:43.835394 systemd[1]: Reached target network-online.target. Feb 8 23:19:43.837049 systemd[1]: Started kubelet.service. Feb 8 23:19:43.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:43.846582 systemd[1]: Starting coreos-metadata.service... Feb 8 23:19:43.853982 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 8 23:19:43.854163 systemd[1]: Finished coreos-metadata.service. Feb 8 23:19:43.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:43.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:43.890619 kubelet[1317]: E0208 23:19:43.890536 1317 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 8 23:19:43.893498 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 8 23:19:43.893626 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 8 23:19:43.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 8 23:19:44.039653 systemd[1]: Stopped kubelet.service. Feb 8 23:19:44.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:44.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:44.056453 systemd[1]: Reloading. Feb 8 23:19:44.119139 /usr/lib/systemd/system-generators/torcx-generator[1387]: time="2024-02-08T23:19:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:19:44.119170 /usr/lib/systemd/system-generators/torcx-generator[1387]: time="2024-02-08T23:19:44Z" level=info msg="torcx already run" Feb 8 23:19:44.191964 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:19:44.191990 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:19:44.210031 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit: BPF prog-id=46 op=LOAD Feb 8 23:19:44.274000 audit: BPF prog-id=31 op=UNLOAD Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit: BPF prog-id=47 op=LOAD Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.274000 audit: BPF prog-id=48 op=LOAD Feb 8 23:19:44.274000 audit: BPF prog-id=32 op=UNLOAD Feb 8 23:19:44.274000 audit: BPF prog-id=33 op=UNLOAD Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit: BPF prog-id=49 op=LOAD Feb 8 23:19:44.276000 audit: BPF prog-id=34 op=UNLOAD Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit: BPF prog-id=50 op=LOAD Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.276000 audit: BPF prog-id=51 op=LOAD Feb 8 23:19:44.276000 audit: BPF prog-id=35 op=UNLOAD Feb 8 23:19:44.276000 audit: BPF prog-id=36 op=UNLOAD Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit: BPF prog-id=52 op=LOAD Feb 8 23:19:44.279000 audit: BPF prog-id=37 op=UNLOAD Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit: BPF prog-id=53 op=LOAD Feb 8 23:19:44.279000 audit: BPF prog-id=38 op=UNLOAD Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit: BPF prog-id=54 op=LOAD Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.279000 audit: BPF prog-id=55 op=LOAD Feb 8 23:19:44.279000 audit: BPF prog-id=39 op=UNLOAD Feb 8 23:19:44.279000 audit: BPF prog-id=40 op=UNLOAD Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit: BPF prog-id=56 op=LOAD Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.280000 audit: BPF prog-id=57 op=LOAD Feb 8 23:19:44.280000 audit: BPF prog-id=41 op=UNLOAD Feb 8 23:19:44.280000 audit: BPF prog-id=42 op=UNLOAD Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit: BPF prog-id=58 op=LOAD Feb 8 23:19:44.281000 audit: BPF prog-id=43 op=UNLOAD Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.281000 audit: BPF prog-id=59 op=LOAD Feb 8 23:19:44.281000 audit: BPF prog-id=44 op=UNLOAD Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.282000 audit: BPF prog-id=60 op=LOAD Feb 8 23:19:44.282000 audit: BPF prog-id=45 op=UNLOAD Feb 8 23:19:44.293819 systemd[1]: Started kubelet.service. Feb 8 23:19:44.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:44.331205 kubelet[1428]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:19:44.331205 kubelet[1428]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 8 23:19:44.331205 kubelet[1428]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:19:44.331530 kubelet[1428]: I0208 23:19:44.331242 1428 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 8 23:19:44.774204 kubelet[1428]: I0208 23:19:44.774156 1428 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 8 23:19:44.774204 kubelet[1428]: I0208 23:19:44.774183 1428 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 8 23:19:44.774435 kubelet[1428]: I0208 23:19:44.774386 1428 server.go:895] "Client rotation is on, will bootstrap in background" Feb 8 23:19:44.776027 kubelet[1428]: I0208 23:19:44.775978 1428 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 8 23:19:44.781847 kubelet[1428]: I0208 23:19:44.781820 1428 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 8 23:19:44.782064 kubelet[1428]: I0208 23:19:44.782042 1428 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 8 23:19:44.782214 kubelet[1428]: I0208 23:19:44.782196 1428 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 8 23:19:44.782318 kubelet[1428]: I0208 23:19:44.782221 1428 topology_manager.go:138] "Creating topology manager with none policy" Feb 8 23:19:44.782318 kubelet[1428]: I0208 23:19:44.782229 1428 container_manager_linux.go:301] "Creating device plugin manager" Feb 8 23:19:44.782367 kubelet[1428]: I0208 23:19:44.782348 1428 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:19:44.782456 kubelet[1428]: I0208 23:19:44.782445 1428 kubelet.go:393] "Attempting to sync node with API server" Feb 8 23:19:44.782481 kubelet[1428]: I0208 23:19:44.782467 1428 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 8 23:19:44.782506 kubelet[1428]: I0208 23:19:44.782495 1428 kubelet.go:309] "Adding apiserver pod source" Feb 8 23:19:44.782529 kubelet[1428]: I0208 23:19:44.782513 1428 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 8 23:19:44.782608 kubelet[1428]: E0208 23:19:44.782583 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:44.782655 kubelet[1428]: E0208 23:19:44.782632 1428 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:44.783147 kubelet[1428]: I0208 23:19:44.783129 1428 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 8 23:19:44.783574 kubelet[1428]: W0208 23:19:44.783553 1428 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 8 23:19:44.784080 kubelet[1428]: I0208 23:19:44.784064 1428 server.go:1232] "Started kubelet" Feb 8 23:19:44.784188 kubelet[1428]: I0208 23:19:44.784167 1428 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 8 23:19:44.784364 kubelet[1428]: I0208 23:19:44.784349 1428 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 8 23:19:44.784609 kubelet[1428]: I0208 23:19:44.784589 1428 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 8 23:19:44.785142 kubelet[1428]: I0208 23:19:44.784812 1428 server.go:462] "Adding debug handlers to kubelet server" Feb 8 23:19:44.785142 kubelet[1428]: E0208 23:19:44.784839 1428 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 8 23:19:44.785142 kubelet[1428]: E0208 23:19:44.784869 1428 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 8 23:19:44.784000 audit[1428]: AVC avc: denied { mac_admin } for pid=1428 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.784000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:19:44.784000 audit[1428]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c375c0 a1=c000c60888 a2=c000c37590 a3=25 items=0 ppid=1 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.784000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:19:44.785000 audit[1428]: AVC avc: denied { mac_admin } for pid=1428 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.785000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:19:44.785000 audit[1428]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c644e0 a1=c000c608a0 a2=c000c37650 a3=25 items=0 ppid=1 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.785000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:19:44.786253 kubelet[1428]: I0208 23:19:44.785883 1428 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 8 23:19:44.786253 kubelet[1428]: I0208 23:19:44.786029 1428 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 8 23:19:44.786253 kubelet[1428]: I0208 23:19:44.786108 1428 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 8 23:19:44.787484 kubelet[1428]: I0208 23:19:44.787469 1428 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 8 23:19:44.787619 kubelet[1428]: I0208 23:19:44.787560 1428 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 8 23:19:44.787619 kubelet[1428]: I0208 23:19:44.787610 1428 reconciler_new.go:29] "Reconciler: start to sync state" Feb 8 23:19:44.788759 kubelet[1428]: E0208 23:19:44.788662 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686ce571167", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 784036199, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 784036199, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.788906 kubelet[1428]: W0208 23:19:44.788888 1428 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.51" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 8 23:19:44.788944 kubelet[1428]: E0208 23:19:44.788936 1428 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.51" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 8 23:19:44.788992 kubelet[1428]: W0208 23:19:44.788981 1428 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 8 23:19:44.789018 kubelet[1428]: E0208 23:19:44.788994 1428 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 8 23:19:44.792889 kubelet[1428]: W0208 23:19:44.790208 1428 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 8 23:19:44.792889 kubelet[1428]: E0208 23:19:44.790235 1428 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 8 23:19:44.792889 kubelet[1428]: E0208 23:19:44.790284 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686ce637948", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 784849224, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 784849224, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.793198 kubelet[1428]: E0208 23:19:44.790465 1428 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.51\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 8 23:19:44.810543 kubelet[1428]: I0208 23:19:44.810504 1428 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 8 23:19:44.810543 kubelet[1428]: I0208 23:19:44.810523 1428 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 8 23:19:44.810543 kubelet[1428]: I0208 23:19:44.810535 1428 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:19:44.810000 audit[1442]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:44.810000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee2ac6bb0 a2=0 a3=7ffee2ac6b9c items=0 ppid=1428 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 8 23:19:44.811000 audit[1444]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:44.811000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd0f903e40 a2=0 a3=7ffd0f903e2c items=0 ppid=1428 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 8 23:19:44.813445 kubelet[1428]: I0208 23:19:44.813418 1428 policy_none.go:49] "None policy: Start" Feb 8 23:19:44.813645 kubelet[1428]: E0208 23:19:44.813549 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe0f707", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.51 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809850631, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809850631, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.813953 kubelet[1428]: I0208 23:19:44.813939 1428 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 8 23:19:44.814011 kubelet[1428]: I0208 23:19:44.813958 1428 state_mem.go:35] "Initializing new in-memory state store" Feb 8 23:19:44.814406 kubelet[1428]: E0208 23:19:44.814352 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe1410a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.51 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809869578, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809869578, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.815403 kubelet[1428]: E0208 23:19:44.815312 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe14db5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.51 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809872821, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809872821, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.819294 systemd[1]: Created slice kubepods.slice. Feb 8 23:19:44.822780 systemd[1]: Created slice kubepods-burstable.slice. Feb 8 23:19:44.825104 systemd[1]: Created slice kubepods-besteffort.slice. Feb 8 23:19:44.829548 kubelet[1428]: I0208 23:19:44.829517 1428 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 8 23:19:44.828000 audit[1428]: AVC avc: denied { mac_admin } for pid=1428 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:44.828000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:19:44.828000 audit[1428]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c36390 a1=c00011ab10 a2=c000c36330 a3=25 items=0 ppid=1 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.828000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:19:44.829757 kubelet[1428]: I0208 23:19:44.829598 1428 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 8 23:19:44.813000 audit[1446]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:44.813000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3398e6f0 a2=0 a3=7ffd3398e6dc items=0 ppid=1428 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:19:44.830179 kubelet[1428]: I0208 23:19:44.829961 1428 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 8 23:19:44.830433 kubelet[1428]: E0208 23:19:44.830404 1428 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.51\" not found" Feb 8 23:19:44.831000 audit[1454]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:44.831000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffde8fec670 a2=0 a3=7ffde8fec65c items=0 ppid=1428 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.831000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:19:44.832670 kubelet[1428]: E0208 23:19:44.832588 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686d12cc064", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 831594596, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 831594596, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.859000 audit[1459]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:44.859000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffff35f9b60 a2=0 a3=7ffff35f9b4c items=0 ppid=1428 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 8 23:19:44.860798 kubelet[1428]: I0208 23:19:44.860773 1428 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 8 23:19:44.860000 audit[1460]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:44.860000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe71b48fc0 a2=0 a3=7ffe71b48fac items=0 ppid=1428 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 8 23:19:44.861000 audit[1461]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:44.861000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb08411c0 a2=0 a3=7fffb08411ac items=0 ppid=1428 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 8 23:19:44.862175 kubelet[1428]: I0208 23:19:44.862040 1428 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 8 23:19:44.862175 kubelet[1428]: I0208 23:19:44.862070 1428 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 8 23:19:44.862175 kubelet[1428]: I0208 23:19:44.862091 1428 kubelet.go:2303] "Starting kubelet main sync loop" Feb 8 23:19:44.862175 kubelet[1428]: E0208 23:19:44.862141 1428 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 8 23:19:44.862000 audit[1462]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:44.862000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcefd6e160 a2=0 a3=7ffcefd6e14c items=0 ppid=1428 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 8 23:19:44.863353 kubelet[1428]: W0208 23:19:44.863325 1428 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 8 23:19:44.863425 kubelet[1428]: E0208 23:19:44.863358 1428 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 8 23:19:44.862000 audit[1463]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:44.862000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffddc65a3d0 a2=0 a3=7ffddc65a3bc items=0 ppid=1428 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 8 23:19:44.863000 audit[1464]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:44.863000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd2145d3c0 a2=0 a3=7ffd2145d3ac items=0 ppid=1428 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 8 23:19:44.863000 audit[1465]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:44.863000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd170291b0 a2=0 a3=7ffd1702919c items=0 ppid=1428 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 8 23:19:44.864000 audit[1466]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:44.864000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd15cc2d30 a2=0 a3=7ffd15cc2d1c items=0 ppid=1428 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:44.864000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 8 23:19:44.888751 kubelet[1428]: I0208 23:19:44.888719 1428 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.51" Feb 8 23:19:44.889567 kubelet[1428]: E0208 23:19:44.889531 1428 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.51" Feb 8 23:19:44.889899 kubelet[1428]: E0208 23:19:44.889819 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe0f707", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.51 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809850631, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 888665113, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe0f707" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.890691 kubelet[1428]: E0208 23:19:44.890632 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe1410a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.51 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809869578, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 888675552, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe1410a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.891357 kubelet[1428]: E0208 23:19:44.891309 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe14db5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.51 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809872821, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 888677904, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe14db5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:44.992094 kubelet[1428]: E0208 23:19:44.992041 1428 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.51\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 8 23:19:45.091316 kubelet[1428]: I0208 23:19:45.091171 1428 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.51" Feb 8 23:19:45.092311 kubelet[1428]: E0208 23:19:45.092203 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe0f707", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.51 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809850631, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 45, 91115368, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe0f707" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:45.092534 kubelet[1428]: E0208 23:19:45.092396 1428 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.51" Feb 8 23:19:45.093508 kubelet[1428]: E0208 23:19:45.093413 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe1410a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.51 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809869578, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 45, 91126689, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe1410a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:45.094220 kubelet[1428]: E0208 23:19:45.094170 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe14db5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.51 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809872821, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 45, 91129291, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe14db5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:45.393846 kubelet[1428]: E0208 23:19:45.393695 1428 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.51\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 8 23:19:45.493850 kubelet[1428]: I0208 23:19:45.493816 1428 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.51" Feb 8 23:19:45.495359 kubelet[1428]: E0208 23:19:45.495322 1428 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.51" Feb 8 23:19:45.495359 kubelet[1428]: E0208 23:19:45.495279 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe0f707", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.51 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809850631, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 45, 493767872, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe0f707" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:45.496177 kubelet[1428]: E0208 23:19:45.496129 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe1410a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.51 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809869578, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 45, 493779343, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe1410a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:45.496813 kubelet[1428]: E0208 23:19:45.496764 1428 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51.17b20686cfe14db5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.51", UID:"10.0.0.51", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.51 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.51"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 19, 44, 809872821, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 19, 45, 493781805, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.51"}': 'events "10.0.0.51.17b20686cfe14db5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:19:45.638512 kubelet[1428]: W0208 23:19:45.638452 1428 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.51" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 8 23:19:45.638512 kubelet[1428]: E0208 23:19:45.638498 1428 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.51" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 8 23:19:45.683523 kubelet[1428]: W0208 23:19:45.683399 1428 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 8 23:19:45.683523 kubelet[1428]: E0208 23:19:45.683437 1428 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 8 23:19:45.775904 kubelet[1428]: I0208 23:19:45.775834 1428 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 8 23:19:45.783070 kubelet[1428]: E0208 23:19:45.783033 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:46.141848 kubelet[1428]: E0208 23:19:46.141720 1428 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.51" not found Feb 8 23:19:46.197584 kubelet[1428]: E0208 23:19:46.197561 1428 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.51\" not found" node="10.0.0.51" Feb 8 23:19:46.296154 kubelet[1428]: I0208 23:19:46.296133 1428 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.51" Feb 8 23:19:46.301030 kubelet[1428]: I0208 23:19:46.301009 1428 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.51" Feb 8 23:19:46.309451 kubelet[1428]: E0208 23:19:46.309425 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:46.409919 kubelet[1428]: E0208 23:19:46.409833 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:46.510215 kubelet[1428]: E0208 23:19:46.510186 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:46.610787 kubelet[1428]: E0208 23:19:46.610759 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:46.711625 kubelet[1428]: E0208 23:19:46.711453 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:46.783802 kubelet[1428]: E0208 23:19:46.783754 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:46.807189 sudo[1246]: pam_unix(sudo:session): session closed for user root Feb 8 23:19:46.806000 audit[1246]: USER_END pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:46.806000 audit[1246]: CRED_DISP pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:19:46.808359 sshd[1242]: pam_unix(sshd:session): session closed for user core Feb 8 23:19:46.808000 audit[1242]: USER_END pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:46.808000 audit[1242]: CRED_DISP pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 8 23:19:46.810753 systemd[1]: sshd@6-10.0.0.51:22-10.0.0.1:42052.service: Deactivated successfully. Feb 8 23:19:46.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.51:22-10.0.0.1:42052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:19:46.811594 systemd[1]: session-7.scope: Deactivated successfully. Feb 8 23:19:46.811871 kubelet[1428]: E0208 23:19:46.811834 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:46.812383 systemd-logind[1107]: Session 7 logged out. Waiting for processes to exit. Feb 8 23:19:46.813026 systemd-logind[1107]: Removed session 7. Feb 8 23:19:46.912054 kubelet[1428]: E0208 23:19:46.912009 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:47.012586 kubelet[1428]: E0208 23:19:47.012510 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:47.113046 kubelet[1428]: E0208 23:19:47.113003 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:47.213520 kubelet[1428]: E0208 23:19:47.213485 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:47.314312 kubelet[1428]: E0208 23:19:47.314175 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:47.414676 kubelet[1428]: E0208 23:19:47.414627 1428 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.51\" not found" Feb 8 23:19:47.515658 kubelet[1428]: I0208 23:19:47.515602 1428 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 8 23:19:47.516187 env[1125]: time="2024-02-08T23:19:47.516138269Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 8 23:19:47.516622 kubelet[1428]: I0208 23:19:47.516595 1428 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 8 23:19:47.784334 kubelet[1428]: I0208 23:19:47.784221 1428 apiserver.go:52] "Watching apiserver" Feb 8 23:19:47.784334 kubelet[1428]: E0208 23:19:47.784248 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:47.787060 kubelet[1428]: I0208 23:19:47.787026 1428 topology_manager.go:215] "Topology Admit Handler" podUID="92393267-c882-48db-8594-60d105ea9664" podNamespace="calico-system" podName="calico-node-lxtjj" Feb 8 23:19:47.787160 kubelet[1428]: I0208 23:19:47.787129 1428 topology_manager.go:215] "Topology Admit Handler" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" podNamespace="calico-system" podName="csi-node-driver-b7p95" Feb 8 23:19:47.787226 kubelet[1428]: I0208 23:19:47.787192 1428 topology_manager.go:215] "Topology Admit Handler" podUID="3c1bd576-336b-44fd-8819-e61ac15b6876" podNamespace="kube-system" podName="kube-proxy-7jphs" Feb 8 23:19:47.787473 kubelet[1428]: E0208 23:19:47.787445 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:19:47.788024 kubelet[1428]: I0208 23:19:47.787952 1428 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 8 23:19:47.792199 systemd[1]: Created slice kubepods-besteffort-pod3c1bd576_336b_44fd_8819_e61ac15b6876.slice. Feb 8 23:19:47.800789 systemd[1]: Created slice kubepods-besteffort-pod92393267_c882_48db_8594_60d105ea9664.slice. Feb 8 23:19:47.801233 kubelet[1428]: I0208 23:19:47.801197 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-xtables-lock\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.801308 kubelet[1428]: I0208 23:19:47.801245 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-var-run-calico\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.801308 kubelet[1428]: I0208 23:19:47.801265 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-cni-log-dir\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.801308 kubelet[1428]: I0208 23:19:47.801285 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ec1960e2-e363-4ba3-a542-3f27f0aa6dc9-varrun\") pod \"csi-node-driver-b7p95\" (UID: \"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9\") " pod="calico-system/csi-node-driver-b7p95" Feb 8 23:19:47.801387 kubelet[1428]: I0208 23:19:47.801368 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/3c1bd576-336b-44fd-8819-e61ac15b6876-kube-proxy\") pod \"kube-proxy-7jphs\" (UID: \"3c1bd576-336b-44fd-8819-e61ac15b6876\") " pod="kube-system/kube-proxy-7jphs" Feb 8 23:19:47.801440 kubelet[1428]: I0208 23:19:47.801418 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-lib-modules\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.801493 kubelet[1428]: I0208 23:19:47.801455 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-policysync\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.801520 kubelet[1428]: I0208 23:19:47.801496 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/92393267-c882-48db-8594-60d105ea9664-node-certs\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.801544 kubelet[1428]: I0208 23:19:47.801534 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-cni-bin-dir\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.801678 kubelet[1428]: I0208 23:19:47.801658 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-flexvol-driver-host\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.801769 kubelet[1428]: I0208 23:19:47.801716 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f9bfr\" (UniqueName: \"kubernetes.io/projected/92393267-c882-48db-8594-60d105ea9664-kube-api-access-f9bfr\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.802130 kubelet[1428]: I0208 23:19:47.802114 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ec1960e2-e363-4ba3-a542-3f27f0aa6dc9-registration-dir\") pod \"csi-node-driver-b7p95\" (UID: \"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9\") " pod="calico-system/csi-node-driver-b7p95" Feb 8 23:19:47.802191 kubelet[1428]: I0208 23:19:47.802141 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p9kxn\" (UniqueName: \"kubernetes.io/projected/ec1960e2-e363-4ba3-a542-3f27f0aa6dc9-kube-api-access-p9kxn\") pod \"csi-node-driver-b7p95\" (UID: \"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9\") " pod="calico-system/csi-node-driver-b7p95" Feb 8 23:19:47.802191 kubelet[1428]: I0208 23:19:47.802160 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3c1bd576-336b-44fd-8819-e61ac15b6876-xtables-lock\") pod \"kube-proxy-7jphs\" (UID: \"3c1bd576-336b-44fd-8819-e61ac15b6876\") " pod="kube-system/kube-proxy-7jphs" Feb 8 23:19:47.802191 kubelet[1428]: I0208 23:19:47.802179 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3c1bd576-336b-44fd-8819-e61ac15b6876-lib-modules\") pod \"kube-proxy-7jphs\" (UID: \"3c1bd576-336b-44fd-8819-e61ac15b6876\") " pod="kube-system/kube-proxy-7jphs" Feb 8 23:19:47.802283 kubelet[1428]: I0208 23:19:47.802197 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/92393267-c882-48db-8594-60d105ea9664-tigera-ca-bundle\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.802283 kubelet[1428]: I0208 23:19:47.802224 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ec1960e2-e363-4ba3-a542-3f27f0aa6dc9-kubelet-dir\") pod \"csi-node-driver-b7p95\" (UID: \"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9\") " pod="calico-system/csi-node-driver-b7p95" Feb 8 23:19:47.802283 kubelet[1428]: I0208 23:19:47.802240 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ec1960e2-e363-4ba3-a542-3f27f0aa6dc9-socket-dir\") pod \"csi-node-driver-b7p95\" (UID: \"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9\") " pod="calico-system/csi-node-driver-b7p95" Feb 8 23:19:47.802283 kubelet[1428]: I0208 23:19:47.802257 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rzjrr\" (UniqueName: \"kubernetes.io/projected/3c1bd576-336b-44fd-8819-e61ac15b6876-kube-api-access-rzjrr\") pod \"kube-proxy-7jphs\" (UID: \"3c1bd576-336b-44fd-8819-e61ac15b6876\") " pod="kube-system/kube-proxy-7jphs" Feb 8 23:19:47.802283 kubelet[1428]: I0208 23:19:47.802275 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-var-lib-calico\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.802394 kubelet[1428]: I0208 23:19:47.802292 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/92393267-c882-48db-8594-60d105ea9664-cni-net-dir\") pod \"calico-node-lxtjj\" (UID: \"92393267-c882-48db-8594-60d105ea9664\") " pod="calico-system/calico-node-lxtjj" Feb 8 23:19:47.903705 kubelet[1428]: E0208 23:19:47.903667 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.903705 kubelet[1428]: W0208 23:19:47.903688 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.903705 kubelet[1428]: E0208 23:19:47.903712 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.904009 kubelet[1428]: E0208 23:19:47.903972 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.904009 kubelet[1428]: W0208 23:19:47.903994 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.904009 kubelet[1428]: E0208 23:19:47.904021 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.904561 kubelet[1428]: E0208 23:19:47.904533 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.904561 kubelet[1428]: W0208 23:19:47.904553 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.904656 kubelet[1428]: E0208 23:19:47.904602 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.904789 kubelet[1428]: E0208 23:19:47.904764 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.904789 kubelet[1428]: W0208 23:19:47.904774 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.904872 kubelet[1428]: E0208 23:19:47.904806 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.904982 kubelet[1428]: E0208 23:19:47.904953 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.904982 kubelet[1428]: W0208 23:19:47.904966 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.905198 kubelet[1428]: E0208 23:19:47.905006 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.905254 kubelet[1428]: E0208 23:19:47.905240 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.905254 kubelet[1428]: W0208 23:19:47.905251 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.905314 kubelet[1428]: E0208 23:19:47.905288 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.905496 kubelet[1428]: E0208 23:19:47.905475 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.905496 kubelet[1428]: W0208 23:19:47.905487 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.905614 kubelet[1428]: E0208 23:19:47.905524 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.905684 kubelet[1428]: E0208 23:19:47.905669 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.905684 kubelet[1428]: W0208 23:19:47.905678 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.905751 kubelet[1428]: E0208 23:19:47.905704 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.905872 kubelet[1428]: E0208 23:19:47.905838 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.905872 kubelet[1428]: W0208 23:19:47.905849 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.905950 kubelet[1428]: E0208 23:19:47.905918 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.906041 kubelet[1428]: E0208 23:19:47.906023 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.906041 kubelet[1428]: W0208 23:19:47.906032 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.906124 kubelet[1428]: E0208 23:19:47.906078 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.908445 kubelet[1428]: E0208 23:19:47.908424 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.908445 kubelet[1428]: W0208 23:19:47.908437 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.908553 kubelet[1428]: E0208 23:19:47.908531 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.908610 kubelet[1428]: E0208 23:19:47.908583 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.908610 kubelet[1428]: W0208 23:19:47.908600 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.908710 kubelet[1428]: E0208 23:19:47.908690 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.908781 kubelet[1428]: E0208 23:19:47.908755 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.908781 kubelet[1428]: W0208 23:19:47.908772 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.908884 kubelet[1428]: E0208 23:19:47.908837 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.908975 kubelet[1428]: E0208 23:19:47.908961 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.908975 kubelet[1428]: W0208 23:19:47.908970 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.909052 kubelet[1428]: E0208 23:19:47.909002 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.909172 kubelet[1428]: E0208 23:19:47.909153 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.909172 kubelet[1428]: W0208 23:19:47.909165 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.909278 kubelet[1428]: E0208 23:19:47.909265 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.909361 kubelet[1428]: E0208 23:19:47.909348 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.909361 kubelet[1428]: W0208 23:19:47.909356 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.909448 kubelet[1428]: E0208 23:19:47.909430 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.909532 kubelet[1428]: E0208 23:19:47.909505 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.909532 kubelet[1428]: W0208 23:19:47.909522 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.909620 kubelet[1428]: E0208 23:19:47.909581 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.909682 kubelet[1428]: E0208 23:19:47.909664 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.909682 kubelet[1428]: W0208 23:19:47.909676 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.909749 kubelet[1428]: E0208 23:19:47.909694 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.909926 kubelet[1428]: E0208 23:19:47.909910 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.909926 kubelet[1428]: W0208 23:19:47.909921 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.910005 kubelet[1428]: E0208 23:19:47.909964 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.910288 kubelet[1428]: E0208 23:19:47.910267 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.910288 kubelet[1428]: W0208 23:19:47.910279 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.910404 kubelet[1428]: E0208 23:19:47.910357 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.910524 kubelet[1428]: E0208 23:19:47.910505 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.910524 kubelet[1428]: W0208 23:19:47.910519 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.910634 kubelet[1428]: E0208 23:19:47.910609 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.910763 kubelet[1428]: E0208 23:19:47.910745 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.910763 kubelet[1428]: W0208 23:19:47.910758 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.910852 kubelet[1428]: E0208 23:19:47.910836 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.911011 kubelet[1428]: E0208 23:19:47.910994 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.911011 kubelet[1428]: W0208 23:19:47.911007 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.911101 kubelet[1428]: E0208 23:19:47.911092 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.911250 kubelet[1428]: E0208 23:19:47.911231 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.911250 kubelet[1428]: W0208 23:19:47.911243 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.911337 kubelet[1428]: E0208 23:19:47.911263 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.911755 kubelet[1428]: E0208 23:19:47.911739 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.911755 kubelet[1428]: W0208 23:19:47.911750 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.911878 kubelet[1428]: E0208 23:19:47.911845 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.912003 kubelet[1428]: E0208 23:19:47.911986 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.912003 kubelet[1428]: W0208 23:19:47.911999 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.912131 kubelet[1428]: E0208 23:19:47.912113 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.912260 kubelet[1428]: E0208 23:19:47.912241 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.912260 kubelet[1428]: W0208 23:19:47.912257 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.912371 kubelet[1428]: E0208 23:19:47.912354 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.912495 kubelet[1428]: E0208 23:19:47.912477 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.912495 kubelet[1428]: W0208 23:19:47.912491 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.912577 kubelet[1428]: E0208 23:19:47.912506 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.913789 kubelet[1428]: E0208 23:19:47.913768 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.913789 kubelet[1428]: W0208 23:19:47.913785 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.913913 kubelet[1428]: E0208 23:19:47.913800 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.914477 kubelet[1428]: E0208 23:19:47.914463 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.914561 kubelet[1428]: W0208 23:19:47.914543 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.914658 kubelet[1428]: E0208 23:19:47.914631 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:47.920814 kubelet[1428]: E0208 23:19:47.920797 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:47.920814 kubelet[1428]: W0208 23:19:47.920808 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:47.920814 kubelet[1428]: E0208 23:19:47.920819 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:48.101735 kubelet[1428]: E0208 23:19:48.100658 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:19:48.101881 env[1125]: time="2024-02-08T23:19:48.101365103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7jphs,Uid:3c1bd576-336b-44fd-8819-e61ac15b6876,Namespace:kube-system,Attempt:0,}" Feb 8 23:19:48.103001 kubelet[1428]: E0208 23:19:48.102930 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:19:48.103607 env[1125]: time="2024-02-08T23:19:48.103561321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lxtjj,Uid:92393267-c882-48db-8594-60d105ea9664,Namespace:calico-system,Attempt:0,}" Feb 8 23:19:48.784819 kubelet[1428]: E0208 23:19:48.784755 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:49.077905 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4258900175.mount: Deactivated successfully. Feb 8 23:19:49.085184 env[1125]: time="2024-02-08T23:19:49.085108822Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:49.087062 env[1125]: time="2024-02-08T23:19:49.087028382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:49.088715 env[1125]: time="2024-02-08T23:19:49.088680040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:49.090395 env[1125]: time="2024-02-08T23:19:49.090369149Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:49.092470 env[1125]: time="2024-02-08T23:19:49.092435516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:49.094039 env[1125]: time="2024-02-08T23:19:49.093999434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:49.095542 env[1125]: time="2024-02-08T23:19:49.095512182Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:49.096985 env[1125]: time="2024-02-08T23:19:49.096958777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:49.119053 env[1125]: time="2024-02-08T23:19:49.118985455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:19:49.119053 env[1125]: time="2024-02-08T23:19:49.119019083Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:19:49.119296 env[1125]: time="2024-02-08T23:19:49.119028985Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:19:49.119296 env[1125]: time="2024-02-08T23:19:49.119188065Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841 pid=1522 runtime=io.containerd.runc.v2 Feb 8 23:19:49.123042 env[1125]: time="2024-02-08T23:19:49.122965407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:19:49.123042 env[1125]: time="2024-02-08T23:19:49.123009147Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:19:49.123167 env[1125]: time="2024-02-08T23:19:49.123039101Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:19:49.123269 env[1125]: time="2024-02-08T23:19:49.123228216Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f748c546ea4157171407b53cbd56f2df0658cf03259a684ff0cbee18ea88dec pid=1518 runtime=io.containerd.runc.v2 Feb 8 23:19:49.129591 systemd[1]: Started cri-containerd-0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841.scope. Feb 8 23:19:49.136143 systemd[1]: Started cri-containerd-5f748c546ea4157171407b53cbd56f2df0658cf03259a684ff0cbee18ea88dec.scope. Feb 8 23:19:49.145219 kernel: kauditd_printk_skb: 416 callbacks suppressed Feb 8 23:19:49.145290 kernel: audit: type=1400 audit(1707434389.141:547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.145310 kernel: audit: type=1400 audit(1707434389.141:548): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.150023 kernel: audit: type=1400 audit(1707434389.141:549): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.150993 kernel: audit: type=1400 audit(1707434389.141:550): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.155045 kernel: audit: type=1400 audit(1707434389.141:551): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.155107 kernel: audit: type=1400 audit(1707434389.141:552): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.158155 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 8 23:19:49.158192 kernel: audit: type=1400 audit(1707434389.141:553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.158207 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 8 23:19:49.158221 kernel: audit: backlog limit exceeded Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit: BPF prog-id=61 op=LOAD Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1522 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656635303165636230396138636339396266346663333437346132 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1522 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656635303165636230396138636339396266346663333437346132 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.144000 audit: BPF prog-id=62 op=LOAD Feb 8 23:19:49.144000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000304bf0 items=0 ppid=1522 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656635303165636230396138636339396266346663333437346132 Feb 8 23:19:49.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit: BPF prog-id=63 op=LOAD Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1518 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373438633534366561343135373137313430376235336362643536 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1518 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373438633534366561343135373137313430376235336362643536 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit: BPF prog-id=64 op=LOAD Feb 8 23:19:49.152000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.151000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000304c38 items=0 ppid=1522 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656635303165636230396138636339396266346663333437346132 Feb 8 23:19:49.161000 audit: BPF prog-id=64 op=UNLOAD Feb 8 23:19:49.161000 audit: BPF prog-id=62 op=UNLOAD Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit: BPF prog-id=66 op=LOAD Feb 8 23:19:49.161000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000305048 items=0 ppid=1522 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062656635303165636230396138636339396266346663333437346132 Feb 8 23:19:49.152000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000306510 items=0 ppid=1518 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373438633534366561343135373137313430376235336362643536 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.161000 audit: BPF prog-id=67 op=LOAD Feb 8 23:19:49.161000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000306558 items=0 ppid=1518 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373438633534366561343135373137313430376235336362643536 Feb 8 23:19:49.162000 audit: BPF prog-id=67 op=UNLOAD Feb 8 23:19:49.162000 audit: BPF prog-id=65 op=UNLOAD Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:49.162000 audit: BPF prog-id=68 op=LOAD Feb 8 23:19:49.162000 audit[1549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000306968 items=0 ppid=1518 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:49.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566373438633534366561343135373137313430376235336362643536 Feb 8 23:19:49.173190 env[1125]: time="2024-02-08T23:19:49.173131541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lxtjj,Uid:92393267-c882-48db-8594-60d105ea9664,Namespace:calico-system,Attempt:0,} returns sandbox id \"0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841\"" Feb 8 23:19:49.174154 kubelet[1428]: E0208 23:19:49.174135 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:19:49.174839 env[1125]: time="2024-02-08T23:19:49.174771045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7jphs,Uid:3c1bd576-336b-44fd-8819-e61ac15b6876,Namespace:kube-system,Attempt:0,} returns sandbox id \"5f748c546ea4157171407b53cbd56f2df0658cf03259a684ff0cbee18ea88dec\"" Feb 8 23:19:49.175377 kubelet[1428]: E0208 23:19:49.175358 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:19:49.176159 env[1125]: time="2024-02-08T23:19:49.176138649Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 8 23:19:49.785389 kubelet[1428]: E0208 23:19:49.785331 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:49.862468 kubelet[1428]: E0208 23:19:49.862416 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:19:50.271550 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3706618146.mount: Deactivated successfully. Feb 8 23:19:50.786392 kubelet[1428]: E0208 23:19:50.786340 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:50.793555 env[1125]: time="2024-02-08T23:19:50.793512394Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:50.795122 env[1125]: time="2024-02-08T23:19:50.795095585Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:50.796455 env[1125]: time="2024-02-08T23:19:50.796414655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:50.797712 env[1125]: time="2024-02-08T23:19:50.797648655Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:50.798153 env[1125]: time="2024-02-08T23:19:50.798117109Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 8 23:19:50.799011 env[1125]: time="2024-02-08T23:19:50.798949723Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 8 23:19:50.800213 env[1125]: time="2024-02-08T23:19:50.800167673Z" level=info msg="CreateContainer within sandbox \"5f748c546ea4157171407b53cbd56f2df0658cf03259a684ff0cbee18ea88dec\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 8 23:19:50.816495 env[1125]: time="2024-02-08T23:19:50.816439505Z" level=info msg="CreateContainer within sandbox \"5f748c546ea4157171407b53cbd56f2df0658cf03259a684ff0cbee18ea88dec\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bdc7d69848a464df5363ab79c8d1f4af89a7c1b3e085ca70ceac18171874265e\"" Feb 8 23:19:50.817162 env[1125]: time="2024-02-08T23:19:50.817106644Z" level=info msg="StartContainer for \"bdc7d69848a464df5363ab79c8d1f4af89a7c1b3e085ca70ceac18171874265e\"" Feb 8 23:19:50.831731 systemd[1]: Started cri-containerd-bdc7d69848a464df5363ab79c8d1f4af89a7c1b3e085ca70ceac18171874265e.scope. Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1518 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633764363938343861343634646635333633616237396338643166 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit: BPF prog-id=69 op=LOAD Feb 8 23:19:50.843000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a40b0 items=0 ppid=1518 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633764363938343861343634646635333633616237396338643166 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit: BPF prog-id=70 op=LOAD Feb 8 23:19:50.843000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a40f8 items=0 ppid=1518 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633764363938343861343634646635333633616237396338643166 Feb 8 23:19:50.843000 audit: BPF prog-id=70 op=UNLOAD Feb 8 23:19:50.843000 audit: BPF prog-id=69 op=UNLOAD Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:50.843000 audit: BPF prog-id=71 op=LOAD Feb 8 23:19:50.843000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a4188 items=0 ppid=1518 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264633764363938343861343634646635333633616237396338643166 Feb 8 23:19:50.857914 env[1125]: time="2024-02-08T23:19:50.857872229Z" level=info msg="StartContainer for \"bdc7d69848a464df5363ab79c8d1f4af89a7c1b3e085ca70ceac18171874265e\" returns successfully" Feb 8 23:19:50.880525 kubelet[1428]: E0208 23:19:50.880466 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:19:50.902151 kubelet[1428]: E0208 23:19:50.902111 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.902151 kubelet[1428]: W0208 23:19:50.902131 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.902151 kubelet[1428]: E0208 23:19:50.902152 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.902385 kubelet[1428]: E0208 23:19:50.902299 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.902385 kubelet[1428]: W0208 23:19:50.902305 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.902385 kubelet[1428]: E0208 23:19:50.902314 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.902457 kubelet[1428]: E0208 23:19:50.902419 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.902457 kubelet[1428]: W0208 23:19:50.902425 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.902457 kubelet[1428]: E0208 23:19:50.902439 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.902581 kubelet[1428]: E0208 23:19:50.902555 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.902581 kubelet[1428]: W0208 23:19:50.902571 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.902581 kubelet[1428]: E0208 23:19:50.902581 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.902702 kubelet[1428]: E0208 23:19:50.902690 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.902702 kubelet[1428]: W0208 23:19:50.902701 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.902748 kubelet[1428]: E0208 23:19:50.902716 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.902840 kubelet[1428]: E0208 23:19:50.902824 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.902879 kubelet[1428]: W0208 23:19:50.902840 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.902879 kubelet[1428]: E0208 23:19:50.902849 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.902970 kubelet[1428]: E0208 23:19:50.902959 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.902970 kubelet[1428]: W0208 23:19:50.902968 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.903016 kubelet[1428]: E0208 23:19:50.902983 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.903095 kubelet[1428]: E0208 23:19:50.903085 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.903095 kubelet[1428]: W0208 23:19:50.903094 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.903144 kubelet[1428]: E0208 23:19:50.903110 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.903221 kubelet[1428]: E0208 23:19:50.903210 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.903221 kubelet[1428]: W0208 23:19:50.903220 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.903266 kubelet[1428]: E0208 23:19:50.903228 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.903732 kubelet[1428]: E0208 23:19:50.903713 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.903732 kubelet[1428]: W0208 23:19:50.903725 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.903798 kubelet[1428]: E0208 23:19:50.903737 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.903900 kubelet[1428]: E0208 23:19:50.903862 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.903900 kubelet[1428]: W0208 23:19:50.903872 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.903900 kubelet[1428]: E0208 23:19:50.903880 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.904003 kubelet[1428]: E0208 23:19:50.903987 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.904003 kubelet[1428]: W0208 23:19:50.903998 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.904058 kubelet[1428]: E0208 23:19:50.904013 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.904142 kubelet[1428]: E0208 23:19:50.904126 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.904169 kubelet[1428]: W0208 23:19:50.904136 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.904169 kubelet[1428]: E0208 23:19:50.904152 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.904321 kubelet[1428]: E0208 23:19:50.904303 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.904321 kubelet[1428]: W0208 23:19:50.904314 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.904374 kubelet[1428]: E0208 23:19:50.904323 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.904481 kubelet[1428]: E0208 23:19:50.904468 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.904507 kubelet[1428]: W0208 23:19:50.904481 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.904507 kubelet[1428]: E0208 23:19:50.904493 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.904683 kubelet[1428]: E0208 23:19:50.904667 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.904683 kubelet[1428]: W0208 23:19:50.904679 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.904758 kubelet[1428]: E0208 23:19:50.904689 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.904864 kubelet[1428]: E0208 23:19:50.904842 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.904893 kubelet[1428]: W0208 23:19:50.904852 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.904893 kubelet[1428]: E0208 23:19:50.904875 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.905017 kubelet[1428]: E0208 23:19:50.905006 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.905017 kubelet[1428]: W0208 23:19:50.905015 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.905071 kubelet[1428]: E0208 23:19:50.905024 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.905169 kubelet[1428]: E0208 23:19:50.905159 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.905169 kubelet[1428]: W0208 23:19:50.905168 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.905217 kubelet[1428]: E0208 23:19:50.905178 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.905315 kubelet[1428]: E0208 23:19:50.905305 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.905315 kubelet[1428]: W0208 23:19:50.905313 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.905364 kubelet[1428]: E0208 23:19:50.905323 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.911000 audit[1671]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:50.911000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd4c95200 a2=0 a3=7ffcd4c951ec items=0 ppid=1609 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.911000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 8 23:19:50.911000 audit[1672]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:50.911000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe082daf70 a2=0 a3=7ffe082daf5c items=0 ppid=1609 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 8 23:19:50.912000 audit[1673]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:50.912000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee805b800 a2=0 a3=7ffee805b7ec items=0 ppid=1609 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 8 23:19:50.912000 audit[1674]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:50.912000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd15d6a9e0 a2=0 a3=7ffd15d6a9cc items=0 ppid=1609 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 8 23:19:50.913000 audit[1675]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:50.913000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5da5f000 a2=0 a3=7ffd5da5efec items=0 ppid=1609 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.913000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 8 23:19:50.913000 audit[1676]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:50.913000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb2dcf930 a2=0 a3=7ffdb2dcf91c items=0 ppid=1609 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:50.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 8 23:19:50.918728 kubelet[1428]: E0208 23:19:50.918702 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.918728 kubelet[1428]: W0208 23:19:50.918718 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.918832 kubelet[1428]: E0208 23:19:50.918736 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.919032 kubelet[1428]: E0208 23:19:50.919010 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.919032 kubelet[1428]: W0208 23:19:50.919026 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.919087 kubelet[1428]: E0208 23:19:50.919041 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.919334 kubelet[1428]: E0208 23:19:50.919304 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.919362 kubelet[1428]: W0208 23:19:50.919331 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.919390 kubelet[1428]: E0208 23:19:50.919364 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.919548 kubelet[1428]: E0208 23:19:50.919530 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.919548 kubelet[1428]: W0208 23:19:50.919540 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.919599 kubelet[1428]: E0208 23:19:50.919554 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.919718 kubelet[1428]: E0208 23:19:50.919701 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.919718 kubelet[1428]: W0208 23:19:50.919711 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.919771 kubelet[1428]: E0208 23:19:50.919724 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.919952 kubelet[1428]: E0208 23:19:50.919935 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.919952 kubelet[1428]: W0208 23:19:50.919946 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.920009 kubelet[1428]: E0208 23:19:50.919963 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.920179 kubelet[1428]: E0208 23:19:50.920165 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.920179 kubelet[1428]: W0208 23:19:50.920175 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.920245 kubelet[1428]: E0208 23:19:50.920189 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.920372 kubelet[1428]: E0208 23:19:50.920349 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.920372 kubelet[1428]: W0208 23:19:50.920361 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.920428 kubelet[1428]: E0208 23:19:50.920375 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.920581 kubelet[1428]: E0208 23:19:50.920568 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.920581 kubelet[1428]: W0208 23:19:50.920577 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.920625 kubelet[1428]: E0208 23:19:50.920585 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.920737 kubelet[1428]: E0208 23:19:50.920726 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.920737 kubelet[1428]: W0208 23:19:50.920734 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.920788 kubelet[1428]: E0208 23:19:50.920743 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.920927 kubelet[1428]: E0208 23:19:50.920914 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.920927 kubelet[1428]: W0208 23:19:50.920924 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.920976 kubelet[1428]: E0208 23:19:50.920933 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:50.921202 kubelet[1428]: E0208 23:19:50.921182 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:50.921202 kubelet[1428]: W0208 23:19:50.921194 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:50.921202 kubelet[1428]: E0208 23:19:50.921203 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.013000 audit[1691]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.013000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd6f16e380 a2=0 a3=7ffd6f16e36c items=0 ppid=1609 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 8 23:19:51.015000 audit[1693]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.015000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd5f4a4d70 a2=0 a3=7ffd5f4a4d5c items=0 ppid=1609 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 8 23:19:51.018000 audit[1696]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.018000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc82380a10 a2=0 a3=7ffc823809fc items=0 ppid=1609 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 8 23:19:51.019000 audit[1697]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.019000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffece3c6880 a2=0 a3=7ffece3c686c items=0 ppid=1609 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 8 23:19:51.021000 audit[1699]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.021000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf455d2e0 a2=0 a3=7ffcf455d2cc items=0 ppid=1609 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 8 23:19:51.022000 audit[1700]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.022000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6c1f1160 a2=0 a3=7fff6c1f114c items=0 ppid=1609 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 8 23:19:51.024000 audit[1702]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.024000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec47ad020 a2=0 a3=7ffec47ad00c items=0 ppid=1609 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 8 23:19:51.027000 audit[1705]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.027000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe2f9f3d30 a2=0 a3=7ffe2f9f3d1c items=0 ppid=1609 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 8 23:19:51.028000 audit[1706]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.028000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb8934e30 a2=0 a3=7ffcb8934e1c items=0 ppid=1609 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 8 23:19:51.030000 audit[1708]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.030000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3a22fb30 a2=0 a3=7ffd3a22fb1c items=0 ppid=1609 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 8 23:19:51.031000 audit[1709]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.031000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea6545c60 a2=0 a3=7ffea6545c4c items=0 ppid=1609 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 8 23:19:51.033000 audit[1711]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.033000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8e48e520 a2=0 a3=7fff8e48e50c items=0 ppid=1609 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:19:51.036000 audit[1714]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.036000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff543be1b0 a2=0 a3=7fff543be19c items=0 ppid=1609 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:19:51.042000 audit[1717]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.042000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe665dc8b0 a2=0 a3=7ffe665dc89c items=0 ppid=1609 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 8 23:19:51.043000 audit[1718]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.043000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeaef70290 a2=0 a3=7ffeaef7027c items=0 ppid=1609 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.043000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 8 23:19:51.044000 audit[1720]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.044000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd5c041ef0 a2=0 a3=7ffd5c041edc items=0 ppid=1609 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:19:51.064000 audit[1726]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.064000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd0ed1e6f0 a2=0 a3=7ffd0ed1e6dc items=0 ppid=1609 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:19:51.065000 audit[1727]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.065000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe02799360 a2=0 a3=7ffe0279934c items=0 ppid=1609 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 8 23:19:51.067000 audit[1729]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:19:51.067000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdb4aecca0 a2=0 a3=7ffdb4aecc8c items=0 ppid=1609 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 8 23:19:51.080000 audit[1735]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:19:51.080000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffead4037b0 a2=0 a3=7ffead40379c items=0 ppid=1609 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:19:51.097000 audit[1735]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:19:51.097000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffead4037b0 a2=0 a3=7ffead40379c items=0 ppid=1609 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:19:51.098000 audit[1741]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.098000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc177412d0 a2=0 a3=7ffc177412bc items=0 ppid=1609 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 8 23:19:51.100000 audit[1743]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.100000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff19534170 a2=0 a3=7fff1953415c items=0 ppid=1609 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 8 23:19:51.104000 audit[1746]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.104000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4d133800 a2=0 a3=7ffe4d1337ec items=0 ppid=1609 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 8 23:19:51.105000 audit[1747]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.105000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd1847d90 a2=0 a3=7fffd1847d7c items=0 ppid=1609 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 8 23:19:51.107000 audit[1749]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.107000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff36f68dd0 a2=0 a3=7fff36f68dbc items=0 ppid=1609 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 8 23:19:51.108000 audit[1750]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.108000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4cc5f1c0 a2=0 a3=7ffc4cc5f1ac items=0 ppid=1609 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 8 23:19:51.110000 audit[1752]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.110000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc140aa810 a2=0 a3=7ffc140aa7fc items=0 ppid=1609 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 8 23:19:51.113000 audit[1755]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.113000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcdf311f50 a2=0 a3=7ffcdf311f3c items=0 ppid=1609 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 8 23:19:51.114000 audit[1756]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.114000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe54b2d8d0 a2=0 a3=7ffe54b2d8bc items=0 ppid=1609 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 8 23:19:51.116000 audit[1758]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.116000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc64847540 a2=0 a3=7ffc6484752c items=0 ppid=1609 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 8 23:19:51.116000 audit[1759]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.116000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea684b800 a2=0 a3=7ffea684b7ec items=0 ppid=1609 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 8 23:19:51.119000 audit[1761]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.119000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd5a8b07e0 a2=0 a3=7ffd5a8b07cc items=0 ppid=1609 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:19:51.121000 audit[1764]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.121000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6541a620 a2=0 a3=7ffc6541a60c items=0 ppid=1609 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 8 23:19:51.124000 audit[1767]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.124000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd697bc30 a2=0 a3=7ffcd697bc1c items=0 ppid=1609 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 8 23:19:51.125000 audit[1768]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.125000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffefcedb1a0 a2=0 a3=7ffefcedb18c items=0 ppid=1609 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 8 23:19:51.127000 audit[1770]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.127000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdb4765c50 a2=0 a3=7ffdb4765c3c items=0 ppid=1609 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:19:51.130000 audit[1773]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.130000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff7111a800 a2=0 a3=7fff7111a7ec items=0 ppid=1609 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:19:51.131000 audit[1774]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.131000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6785c080 a2=0 a3=7ffc6785c06c items=0 ppid=1609 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 8 23:19:51.133000 audit[1776]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.133000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd1b3fd810 a2=0 a3=7ffd1b3fd7fc items=0 ppid=1609 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 8 23:19:51.134000 audit[1777]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.134000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe54f0cbb0 a2=0 a3=7ffe54f0cb9c items=0 ppid=1609 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 8 23:19:51.136000 audit[1779]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.136000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea86baca0 a2=0 a3=7ffea86bac8c items=0 ppid=1609 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:19:51.138000 audit[1782]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:19:51.138000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff43b60b10 a2=0 a3=7fff43b60afc items=0 ppid=1609 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:19:51.141000 audit[1784]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 8 23:19:51.141000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe67ac2c20 a2=0 a3=7ffe67ac2c0c items=0 ppid=1609 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.141000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:19:51.141000 audit[1784]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 8 23:19:51.141000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe67ac2c20 a2=0 a3=7ffe67ac2c0c items=0 ppid=1609 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:51.141000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:19:51.787045 kubelet[1428]: E0208 23:19:51.787002 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:51.862820 kubelet[1428]: E0208 23:19:51.862751 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:19:51.880998 kubelet[1428]: E0208 23:19:51.880972 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:19:51.910183 kubelet[1428]: E0208 23:19:51.910153 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.910183 kubelet[1428]: W0208 23:19:51.910169 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.910183 kubelet[1428]: E0208 23:19:51.910187 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.910374 kubelet[1428]: E0208 23:19:51.910323 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.910374 kubelet[1428]: W0208 23:19:51.910329 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.910374 kubelet[1428]: E0208 23:19:51.910337 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.910486 kubelet[1428]: E0208 23:19:51.910471 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.910486 kubelet[1428]: W0208 23:19:51.910480 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.910486 kubelet[1428]: E0208 23:19:51.910488 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.910635 kubelet[1428]: E0208 23:19:51.910614 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.910635 kubelet[1428]: W0208 23:19:51.910623 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.910635 kubelet[1428]: E0208 23:19:51.910632 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.910781 kubelet[1428]: E0208 23:19:51.910762 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.910781 kubelet[1428]: W0208 23:19:51.910773 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.910781 kubelet[1428]: E0208 23:19:51.910782 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.910936 kubelet[1428]: E0208 23:19:51.910921 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.910936 kubelet[1428]: W0208 23:19:51.910930 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.911072 kubelet[1428]: E0208 23:19:51.910940 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.911072 kubelet[1428]: E0208 23:19:51.911067 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.911072 kubelet[1428]: W0208 23:19:51.911072 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.911182 kubelet[1428]: E0208 23:19:51.911083 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.911233 kubelet[1428]: E0208 23:19:51.911222 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.911233 kubelet[1428]: W0208 23:19:51.911230 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.911300 kubelet[1428]: E0208 23:19:51.911239 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.911391 kubelet[1428]: E0208 23:19:51.911371 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.911391 kubelet[1428]: W0208 23:19:51.911380 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.911391 kubelet[1428]: E0208 23:19:51.911389 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.911530 kubelet[1428]: E0208 23:19:51.911516 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.911530 kubelet[1428]: W0208 23:19:51.911525 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.911600 kubelet[1428]: E0208 23:19:51.911534 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.911670 kubelet[1428]: E0208 23:19:51.911657 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.911670 kubelet[1428]: W0208 23:19:51.911665 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.911734 kubelet[1428]: E0208 23:19:51.911674 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.911812 kubelet[1428]: E0208 23:19:51.911799 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.911812 kubelet[1428]: W0208 23:19:51.911808 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.911911 kubelet[1428]: E0208 23:19:51.911818 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.911982 kubelet[1428]: E0208 23:19:51.911968 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.911982 kubelet[1428]: W0208 23:19:51.911977 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.912055 kubelet[1428]: E0208 23:19:51.911986 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.912130 kubelet[1428]: E0208 23:19:51.912108 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.912130 kubelet[1428]: W0208 23:19:51.912127 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.912198 kubelet[1428]: E0208 23:19:51.912136 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.912271 kubelet[1428]: E0208 23:19:51.912258 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.912271 kubelet[1428]: W0208 23:19:51.912267 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.912342 kubelet[1428]: E0208 23:19:51.912275 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.912414 kubelet[1428]: E0208 23:19:51.912401 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.912414 kubelet[1428]: W0208 23:19:51.912410 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.912477 kubelet[1428]: E0208 23:19:51.912418 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.912558 kubelet[1428]: E0208 23:19:51.912545 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.912558 kubelet[1428]: W0208 23:19:51.912553 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.912558 kubelet[1428]: E0208 23:19:51.912562 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.912698 kubelet[1428]: E0208 23:19:51.912685 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.912698 kubelet[1428]: W0208 23:19:51.912694 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.912761 kubelet[1428]: E0208 23:19:51.912702 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.912843 kubelet[1428]: E0208 23:19:51.912829 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.912843 kubelet[1428]: W0208 23:19:51.912837 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.912922 kubelet[1428]: E0208 23:19:51.912849 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.913106 kubelet[1428]: E0208 23:19:51.913081 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.913106 kubelet[1428]: W0208 23:19:51.913092 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.913106 kubelet[1428]: E0208 23:19:51.913103 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.924552 kubelet[1428]: E0208 23:19:51.924493 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.924552 kubelet[1428]: W0208 23:19:51.924539 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.924669 kubelet[1428]: E0208 23:19:51.924562 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.924805 kubelet[1428]: E0208 23:19:51.924782 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.924805 kubelet[1428]: W0208 23:19:51.924793 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.924907 kubelet[1428]: E0208 23:19:51.924808 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.925167 kubelet[1428]: E0208 23:19:51.925132 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.925167 kubelet[1428]: W0208 23:19:51.925162 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.925256 kubelet[1428]: E0208 23:19:51.925192 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.925406 kubelet[1428]: E0208 23:19:51.925388 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.925406 kubelet[1428]: W0208 23:19:51.925398 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.925492 kubelet[1428]: E0208 23:19:51.925413 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.925581 kubelet[1428]: E0208 23:19:51.925565 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.925581 kubelet[1428]: W0208 23:19:51.925575 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.925647 kubelet[1428]: E0208 23:19:51.925587 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.925756 kubelet[1428]: E0208 23:19:51.925742 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.925756 kubelet[1428]: W0208 23:19:51.925751 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.925821 kubelet[1428]: E0208 23:19:51.925764 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.926025 kubelet[1428]: E0208 23:19:51.925992 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.926025 kubelet[1428]: W0208 23:19:51.926006 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.926025 kubelet[1428]: E0208 23:19:51.926025 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.926282 kubelet[1428]: E0208 23:19:51.926182 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.926282 kubelet[1428]: W0208 23:19:51.926189 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.926282 kubelet[1428]: E0208 23:19:51.926202 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.926468 kubelet[1428]: E0208 23:19:51.926448 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.926468 kubelet[1428]: W0208 23:19:51.926458 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.926523 kubelet[1428]: E0208 23:19:51.926471 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.926685 kubelet[1428]: E0208 23:19:51.926665 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.926685 kubelet[1428]: W0208 23:19:51.926678 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.926790 kubelet[1428]: E0208 23:19:51.926697 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.926923 kubelet[1428]: E0208 23:19:51.926907 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.926923 kubelet[1428]: W0208 23:19:51.926917 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.927019 kubelet[1428]: E0208 23:19:51.926933 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:51.927100 kubelet[1428]: E0208 23:19:51.927084 1428 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:19:51.927100 kubelet[1428]: W0208 23:19:51.927094 1428 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:19:51.927100 kubelet[1428]: E0208 23:19:51.927102 1428 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:19:52.787907 kubelet[1428]: E0208 23:19:52.787849 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:53.691531 env[1125]: time="2024-02-08T23:19:53.691471815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:53.693447 env[1125]: time="2024-02-08T23:19:53.693386142Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:53.695476 env[1125]: time="2024-02-08T23:19:53.695448773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:53.697476 env[1125]: time="2024-02-08T23:19:53.697446459Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:53.698588 env[1125]: time="2024-02-08T23:19:53.698538873Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 8 23:19:53.700725 env[1125]: time="2024-02-08T23:19:53.700690511Z" level=info msg="CreateContainer within sandbox \"0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 8 23:19:53.713227 env[1125]: time="2024-02-08T23:19:53.713177169Z" level=info msg="CreateContainer within sandbox \"0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8e993072902216e2be2cc06f6b0ee41d96432bdab87ea7752ef2966ecb2cb87c\"" Feb 8 23:19:53.713644 env[1125]: time="2024-02-08T23:19:53.713617543Z" level=info msg="StartContainer for \"8e993072902216e2be2cc06f6b0ee41d96432bdab87ea7752ef2966ecb2cb87c\"" Feb 8 23:19:53.728772 systemd[1]: Started cri-containerd-8e993072902216e2be2cc06f6b0ee41d96432bdab87ea7752ef2966ecb2cb87c.scope. Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1522 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393933303732393032323136653262653263633036663662306565 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit: BPF prog-id=72 op=LOAD Feb 8 23:19:53.739000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000280db0 items=0 ppid=1522 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393933303732393032323136653262653263633036663662306565 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit: BPF prog-id=73 op=LOAD Feb 8 23:19:53.739000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000280df8 items=0 ppid=1522 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393933303732393032323136653262653263633036663662306565 Feb 8 23:19:53.739000 audit: BPF prog-id=73 op=UNLOAD Feb 8 23:19:53.739000 audit: BPF prog-id=72 op=UNLOAD Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:53.739000 audit: BPF prog-id=74 op=LOAD Feb 8 23:19:53.739000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000280e88 items=0 ppid=1522 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:53.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393933303732393032323136653262653263633036663662306565 Feb 8 23:19:53.752809 env[1125]: time="2024-02-08T23:19:53.752767303Z" level=info msg="StartContainer for \"8e993072902216e2be2cc06f6b0ee41d96432bdab87ea7752ef2966ecb2cb87c\" returns successfully" Feb 8 23:19:53.760595 systemd[1]: cri-containerd-8e993072902216e2be2cc06f6b0ee41d96432bdab87ea7752ef2966ecb2cb87c.scope: Deactivated successfully. Feb 8 23:19:53.765000 audit: BPF prog-id=74 op=UNLOAD Feb 8 23:19:53.788442 kubelet[1428]: E0208 23:19:53.788377 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:53.862531 kubelet[1428]: E0208 23:19:53.862484 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:19:53.884965 kubelet[1428]: E0208 23:19:53.884942 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:19:53.894804 kubelet[1428]: I0208 23:19:53.894784 1428 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7jphs" podStartSLOduration=6.271823794 podCreationTimestamp="2024-02-08 23:19:46 +0000 UTC" firstStartedPulling="2024-02-08 23:19:49.175674741 +0000 UTC m=+4.878591906" lastFinishedPulling="2024-02-08 23:19:50.798587825 +0000 UTC m=+6.501504980" observedRunningTime="2024-02-08 23:19:50.887654336 +0000 UTC m=+6.590571501" watchObservedRunningTime="2024-02-08 23:19:53.894736868 +0000 UTC m=+9.597654023" Feb 8 23:19:54.121803 env[1125]: time="2024-02-08T23:19:54.121659376Z" level=info msg="shim disconnected" id=8e993072902216e2be2cc06f6b0ee41d96432bdab87ea7752ef2966ecb2cb87c Feb 8 23:19:54.121803 env[1125]: time="2024-02-08T23:19:54.121708843Z" level=warning msg="cleaning up after shim disconnected" id=8e993072902216e2be2cc06f6b0ee41d96432bdab87ea7752ef2966ecb2cb87c namespace=k8s.io Feb 8 23:19:54.121803 env[1125]: time="2024-02-08T23:19:54.121718264Z" level=info msg="cleaning up dead shim" Feb 8 23:19:54.133128 env[1125]: time="2024-02-08T23:19:54.133079640Z" level=warning msg="cleanup warnings time=\"2024-02-08T23:19:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1868 runtime=io.containerd.runc.v2\n" Feb 8 23:19:54.708593 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8e993072902216e2be2cc06f6b0ee41d96432bdab87ea7752ef2966ecb2cb87c-rootfs.mount: Deactivated successfully. Feb 8 23:19:54.789237 kubelet[1428]: E0208 23:19:54.789198 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:54.887268 kubelet[1428]: E0208 23:19:54.887236 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:19:54.887882 env[1125]: time="2024-02-08T23:19:54.887840748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 8 23:19:55.789847 kubelet[1428]: E0208 23:19:55.789804 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:55.862710 kubelet[1428]: E0208 23:19:55.862659 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:19:56.531126 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2775537160.mount: Deactivated successfully. Feb 8 23:19:56.790175 kubelet[1428]: E0208 23:19:56.790082 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:57.790744 kubelet[1428]: E0208 23:19:57.790708 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:57.862559 kubelet[1428]: E0208 23:19:57.862499 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:19:58.791019 kubelet[1428]: E0208 23:19:58.790985 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:59.730133 env[1125]: time="2024-02-08T23:19:59.730071865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:59.733459 env[1125]: time="2024-02-08T23:19:59.733430452Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:59.735154 env[1125]: time="2024-02-08T23:19:59.735113005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:59.736891 env[1125]: time="2024-02-08T23:19:59.736845422Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:19:59.737523 env[1125]: time="2024-02-08T23:19:59.737492175Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 8 23:19:59.739413 env[1125]: time="2024-02-08T23:19:59.739371961Z" level=info msg="CreateContainer within sandbox \"0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 8 23:19:59.752191 env[1125]: time="2024-02-08T23:19:59.752154588Z" level=info msg="CreateContainer within sandbox \"0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c7fe2fa463b0dfb9b97fbff4ee43310a2494575869ba467c92d7bf3acf2649af\"" Feb 8 23:19:59.752534 env[1125]: time="2024-02-08T23:19:59.752505780Z" level=info msg="StartContainer for \"c7fe2fa463b0dfb9b97fbff4ee43310a2494575869ba467c92d7bf3acf2649af\"" Feb 8 23:19:59.768671 systemd[1]: Started cri-containerd-c7fe2fa463b0dfb9b97fbff4ee43310a2494575869ba467c92d7bf3acf2649af.scope. Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.782698 kernel: kauditd_printk_skb: 346 callbacks suppressed Feb 8 23:19:59.782772 kernel: audit: type=1400 audit(1707434399.779:647): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.782794 kernel: audit: type=1300 audit(1707434399.779:647): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1522 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:59.779000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1522 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:59.790946 kernel: audit: type=1327 audit(1707434399.779:647): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337666532666134363362306466623962393766626666346565343333 Feb 8 23:19:59.791078 kernel: audit: type=1400 audit(1707434399.779:648): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337666532666134363362306466623962393766626666346565343333 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.793325 kubelet[1428]: E0208 23:19:59.793287 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:19:59.793727 kernel: audit: type=1400 audit(1707434399.779:648): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.793769 kernel: audit: type=1400 audit(1707434399.779:648): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.797644 kernel: audit: type=1400 audit(1707434399.779:648): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.797707 kernel: audit: type=1400 audit(1707434399.779:648): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.801910 kernel: audit: type=1400 audit(1707434399.779:648): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.804672 kernel: audit: type=1400 audit(1707434399.779:648): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.779000 audit: BPF prog-id=75 op=LOAD Feb 8 23:19:59.779000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ae7a0 items=0 ppid=1522 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:59.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337666532666134363362306466623962393766626666346565343333 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.781000 audit: BPF prog-id=76 op=LOAD Feb 8 23:19:59.781000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ae7e8 items=0 ppid=1522 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:59.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337666532666134363362306466623962393766626666346565343333 Feb 8 23:19:59.785000 audit: BPF prog-id=76 op=UNLOAD Feb 8 23:19:59.785000 audit: BPF prog-id=75 op=UNLOAD Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.806240 env[1125]: time="2024-02-08T23:19:59.806196788Z" level=info msg="StartContainer for \"c7fe2fa463b0dfb9b97fbff4ee43310a2494575869ba467c92d7bf3acf2649af\" returns successfully" Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:19:59.785000 audit: BPF prog-id=77 op=LOAD Feb 8 23:19:59.785000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ae878 items=0 ppid=1522 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:19:59.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337666532666134363362306466623962393766626666346565343333 Feb 8 23:19:59.862924 kubelet[1428]: E0208 23:19:59.862866 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:19:59.894840 kubelet[1428]: E0208 23:19:59.894795 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:20:00.665029 systemd[1]: cri-containerd-c7fe2fa463b0dfb9b97fbff4ee43310a2494575869ba467c92d7bf3acf2649af.scope: Deactivated successfully. Feb 8 23:20:00.670000 audit: BPF prog-id=77 op=UNLOAD Feb 8 23:20:00.718208 kubelet[1428]: I0208 23:20:00.718179 1428 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 8 23:20:00.747322 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c7fe2fa463b0dfb9b97fbff4ee43310a2494575869ba467c92d7bf3acf2649af-rootfs.mount: Deactivated successfully. Feb 8 23:20:00.793959 kubelet[1428]: E0208 23:20:00.793927 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:00.896311 kubelet[1428]: E0208 23:20:00.896279 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:20:01.106717 env[1125]: time="2024-02-08T23:20:01.106558574Z" level=info msg="shim disconnected" id=c7fe2fa463b0dfb9b97fbff4ee43310a2494575869ba467c92d7bf3acf2649af Feb 8 23:20:01.106717 env[1125]: time="2024-02-08T23:20:01.106608671Z" level=warning msg="cleaning up after shim disconnected" id=c7fe2fa463b0dfb9b97fbff4ee43310a2494575869ba467c92d7bf3acf2649af namespace=k8s.io Feb 8 23:20:01.106717 env[1125]: time="2024-02-08T23:20:01.106620790Z" level=info msg="cleaning up dead shim" Feb 8 23:20:01.114050 env[1125]: time="2024-02-08T23:20:01.113972572Z" level=warning msg="cleanup warnings time=\"2024-02-08T23:20:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1936 runtime=io.containerd.runc.v2\n" Feb 8 23:20:01.794458 kubelet[1428]: E0208 23:20:01.794405 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:01.867374 systemd[1]: Created slice kubepods-besteffort-podec1960e2_e363_4ba3_a542_3f27f0aa6dc9.slice. Feb 8 23:20:01.869304 env[1125]: time="2024-02-08T23:20:01.869259970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b7p95,Uid:ec1960e2-e363-4ba3-a542-3f27f0aa6dc9,Namespace:calico-system,Attempt:0,}" Feb 8 23:20:01.899693 kubelet[1428]: E0208 23:20:01.899659 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:20:01.900825 env[1125]: time="2024-02-08T23:20:01.900781974Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 8 23:20:01.920644 env[1125]: time="2024-02-08T23:20:01.920554818Z" level=error msg="Failed to destroy network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:01.921031 env[1125]: time="2024-02-08T23:20:01.920990156Z" level=error msg="encountered an error cleaning up failed sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:01.921079 env[1125]: time="2024-02-08T23:20:01.921054134Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b7p95,Uid:ec1960e2-e363-4ba3-a542-3f27f0aa6dc9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:01.921443 kubelet[1428]: E0208 23:20:01.921410 1428 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:01.921521 kubelet[1428]: E0208 23:20:01.921499 1428 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-b7p95" Feb 8 23:20:01.921552 kubelet[1428]: E0208 23:20:01.921535 1428 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-b7p95" Feb 8 23:20:01.921635 kubelet[1428]: E0208 23:20:01.921616 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-b7p95_calico-system(ec1960e2-e363-4ba3-a542-3f27f0aa6dc9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-b7p95_calico-system(ec1960e2-e363-4ba3-a542-3f27f0aa6dc9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:20:01.921815 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c-shm.mount: Deactivated successfully. Feb 8 23:20:02.795316 kubelet[1428]: E0208 23:20:02.795247 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:02.831663 kubelet[1428]: I0208 23:20:02.831615 1428 topology_manager.go:215] "Topology Admit Handler" podUID="65904586-615d-4257-878f-40c1373ce461" podNamespace="default" podName="nginx-deployment-6d5f899847-znfxj" Feb 8 23:20:02.837459 systemd[1]: Created slice kubepods-besteffort-pod65904586_615d_4257_878f_40c1373ce461.slice. Feb 8 23:20:02.882313 kubelet[1428]: I0208 23:20:02.882251 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ngthg\" (UniqueName: \"kubernetes.io/projected/65904586-615d-4257-878f-40c1373ce461-kube-api-access-ngthg\") pod \"nginx-deployment-6d5f899847-znfxj\" (UID: \"65904586-615d-4257-878f-40c1373ce461\") " pod="default/nginx-deployment-6d5f899847-znfxj" Feb 8 23:20:02.902697 kubelet[1428]: I0208 23:20:02.902664 1428 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:02.905320 env[1125]: time="2024-02-08T23:20:02.905265194Z" level=info msg="StopPodSandbox for \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\"" Feb 8 23:20:02.927597 env[1125]: time="2024-02-08T23:20:02.927509575Z" level=error msg="StopPodSandbox for \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\" failed" error="failed to destroy network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:02.927922 kubelet[1428]: E0208 23:20:02.927894 1428 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:02.927999 kubelet[1428]: E0208 23:20:02.927986 1428 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c"} Feb 8 23:20:02.928050 kubelet[1428]: E0208 23:20:02.928037 1428 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:20:02.928118 kubelet[1428]: E0208 23:20:02.928082 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-b7p95" podUID="ec1960e2-e363-4ba3-a542-3f27f0aa6dc9" Feb 8 23:20:03.141007 env[1125]: time="2024-02-08T23:20:03.140852770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-znfxj,Uid:65904586-615d-4257-878f-40c1373ce461,Namespace:default,Attempt:0,}" Feb 8 23:20:03.195959 env[1125]: time="2024-02-08T23:20:03.195849618Z" level=error msg="Failed to destroy network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:03.196419 env[1125]: time="2024-02-08T23:20:03.196376057Z" level=error msg="encountered an error cleaning up failed sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:03.196483 env[1125]: time="2024-02-08T23:20:03.196450264Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-znfxj,Uid:65904586-615d-4257-878f-40c1373ce461,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:03.196800 kubelet[1428]: E0208 23:20:03.196740 1428 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:03.196800 kubelet[1428]: E0208 23:20:03.196807 1428 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-znfxj" Feb 8 23:20:03.197098 kubelet[1428]: E0208 23:20:03.196827 1428 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-znfxj" Feb 8 23:20:03.197098 kubelet[1428]: E0208 23:20:03.196891 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-znfxj_default(65904586-615d-4257-878f-40c1373ce461)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-znfxj_default(65904586-615d-4257-878f-40c1373ce461)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-znfxj" podUID="65904586-615d-4257-878f-40c1373ce461" Feb 8 23:20:03.197270 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132-shm.mount: Deactivated successfully. Feb 8 23:20:03.795684 kubelet[1428]: E0208 23:20:03.795615 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:03.905556 kubelet[1428]: I0208 23:20:03.905509 1428 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:03.906024 env[1125]: time="2024-02-08T23:20:03.905981115Z" level=info msg="StopPodSandbox for \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\"" Feb 8 23:20:03.929365 env[1125]: time="2024-02-08T23:20:03.929272830Z" level=error msg="StopPodSandbox for \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\" failed" error="failed to destroy network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:20:03.929606 kubelet[1428]: E0208 23:20:03.929584 1428 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:03.929674 kubelet[1428]: E0208 23:20:03.929631 1428 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132"} Feb 8 23:20:03.929674 kubelet[1428]: E0208 23:20:03.929667 1428 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"65904586-615d-4257-878f-40c1373ce461\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:20:03.929808 kubelet[1428]: E0208 23:20:03.929700 1428 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"65904586-615d-4257-878f-40c1373ce461\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-znfxj" podUID="65904586-615d-4257-878f-40c1373ce461" Feb 8 23:20:04.151000 audit[2069]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:04.151000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcc9e9cac0 a2=0 a3=7ffcc9e9caac items=0 ppid=1609 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:04.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:04.156000 audit[2069]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:04.156000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffcc9e9cac0 a2=0 a3=31030 items=0 ppid=1609 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:04.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:04.169000 audit[2071]: NETFILTER_CFG table=filter:67 family=2 entries=11 op=nft_register_rule pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:04.169000 audit[2071]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc5abaf9a0 a2=0 a3=7ffc5abaf98c items=0 ppid=1609 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:04.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:04.170000 audit[2071]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:04.170000 audit[2071]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc5abaf9a0 a2=0 a3=7ffc5abaf98c items=0 ppid=1609 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:04.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:04.782768 kubelet[1428]: E0208 23:20:04.782726 1428 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:04.795981 kubelet[1428]: E0208 23:20:04.795962 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:05.155000 audit[2076]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:05.159504 kernel: kauditd_printk_skb: 46 callbacks suppressed Feb 8 23:20:05.159572 kernel: audit: type=1325 audit(1707434405.155:658): table=filter:69 family=2 entries=8 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:05.159593 kernel: audit: type=1300 audit(1707434405.155:658): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd426da070 a2=0 a3=7ffd426da05c items=0 ppid=1609 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:05.155000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd426da070 a2=0 a3=7ffd426da05c items=0 ppid=1609 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:05.155000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:05.164223 kernel: audit: type=1327 audit(1707434405.155:658): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:05.168000 audit[2076]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:05.168000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffd426da070 a2=0 a3=7ffd426da05c items=0 ppid=1609 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:05.176626 kernel: audit: type=1325 audit(1707434405.168:659): table=nat:70 family=2 entries=44 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:05.176690 kernel: audit: type=1300 audit(1707434405.168:659): arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffd426da070 a2=0 a3=7ffd426da05c items=0 ppid=1609 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:05.176721 kernel: audit: type=1327 audit(1707434405.168:659): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:05.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:05.796144 kubelet[1428]: E0208 23:20:05.796077 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:06.188000 audit[2079]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:06.188000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe5be794a0 a2=0 a3=7ffe5be7948c items=0 ppid=1609 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:06.194304 kernel: audit: type=1325 audit(1707434406.188:660): table=filter:71 family=2 entries=8 op=nft_register_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:06.194373 kernel: audit: type=1300 audit(1707434406.188:660): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe5be794a0 a2=0 a3=7ffe5be7948c items=0 ppid=1609 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:06.194402 kernel: audit: type=1327 audit(1707434406.188:660): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:06.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:06.203000 audit[2079]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:06.203000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffe5be794a0 a2=0 a3=7ffe5be7948c items=0 ppid=1609 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:06.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:06.206932 kernel: audit: type=1325 audit(1707434406.203:661): table=nat:72 family=2 entries=56 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:06.796341 kubelet[1428]: E0208 23:20:06.796288 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:07.797217 kubelet[1428]: E0208 23:20:07.797163 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:08.797536 kubelet[1428]: E0208 23:20:08.797480 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:09.400210 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount84030281.mount: Deactivated successfully. Feb 8 23:20:09.798130 kubelet[1428]: E0208 23:20:09.797973 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:10.004539 env[1125]: time="2024-02-08T23:20:10.004492705Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:10.006332 env[1125]: time="2024-02-08T23:20:10.006304767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:10.008140 env[1125]: time="2024-02-08T23:20:10.008098388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:10.009552 env[1125]: time="2024-02-08T23:20:10.009513493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:10.009820 env[1125]: time="2024-02-08T23:20:10.009781385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 8 23:20:10.016699 env[1125]: time="2024-02-08T23:20:10.015780732Z" level=info msg="CreateContainer within sandbox \"0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 8 23:20:10.027430 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2534278679.mount: Deactivated successfully. Feb 8 23:20:10.030339 env[1125]: time="2024-02-08T23:20:10.030281250Z" level=info msg="CreateContainer within sandbox \"0bef501ecb09a8cc99bf4fc3474a2550327a32c6bec4d9b3ea6f003916e81841\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8ce71e7b8c5735590ca8f5446f0919dc60e530ff1fc94154b0dcba73f96248c5\"" Feb 8 23:20:10.030730 env[1125]: time="2024-02-08T23:20:10.030706626Z" level=info msg="StartContainer for \"8ce71e7b8c5735590ca8f5446f0919dc60e530ff1fc94154b0dcba73f96248c5\"" Feb 8 23:20:10.045484 systemd[1]: Started cri-containerd-8ce71e7b8c5735590ca8f5446f0919dc60e530ff1fc94154b0dcba73f96248c5.scope. Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1522 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:10.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863653731653762386335373335353930636138663534343666303931 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit: BPF prog-id=78 op=LOAD Feb 8 23:20:10.064000 audit[2091]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000308dc0 items=0 ppid=1522 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:10.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863653731653762386335373335353930636138663534343666303931 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit: BPF prog-id=79 op=LOAD Feb 8 23:20:10.064000 audit[2091]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000308e08 items=0 ppid=1522 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:10.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863653731653762386335373335353930636138663534343666303931 Feb 8 23:20:10.064000 audit: BPF prog-id=79 op=UNLOAD Feb 8 23:20:10.064000 audit: BPF prog-id=78 op=UNLOAD Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { perfmon } for pid=2091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit[2091]: AVC avc: denied { bpf } for pid=2091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:10.064000 audit: BPF prog-id=80 op=LOAD Feb 8 23:20:10.064000 audit[2091]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000308e98 items=0 ppid=1522 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:10.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863653731653762386335373335353930636138663534343666303931 Feb 8 23:20:10.078389 env[1125]: time="2024-02-08T23:20:10.078337546Z" level=info msg="StartContainer for \"8ce71e7b8c5735590ca8f5446f0919dc60e530ff1fc94154b0dcba73f96248c5\" returns successfully" Feb 8 23:20:10.142595 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 8 23:20:10.142744 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 8 23:20:10.798887 kubelet[1428]: E0208 23:20:10.798840 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:10.917082 kubelet[1428]: E0208 23:20:10.917060 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:20:10.926692 kubelet[1428]: I0208 23:20:10.926669 1428 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-lxtjj" podStartSLOduration=4.092420458 podCreationTimestamp="2024-02-08 23:19:46 +0000 UTC" firstStartedPulling="2024-02-08 23:19:49.175932153 +0000 UTC m=+4.878849308" lastFinishedPulling="2024-02-08 23:20:10.010148393 +0000 UTC m=+25.713065548" observedRunningTime="2024-02-08 23:20:10.926454892 +0000 UTC m=+26.629372047" watchObservedRunningTime="2024-02-08 23:20:10.926636698 +0000 UTC m=+26.629553863" Feb 8 23:20:11.318089 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 8 23:20:11.318269 kernel: audit: type=1400 audit(1707434411.314:668): avc: denied { write } for pid=2213 comm="tee" name="fd" dev="proc" ino=19370 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.314000 audit[2213]: AVC avc: denied { write } for pid=2213 comm="tee" name="fd" dev="proc" ino=19370 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.322806 kernel: audit: type=1300 audit(1707434411.314:668): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff86db297b a2=241 a3=1b6 items=1 ppid=2184 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.314000 audit[2213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff86db297b a2=241 a3=1b6 items=1 ppid=2184 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.314000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 8 23:20:11.327379 kernel: audit: type=1307 audit(1707434411.314:668): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 8 23:20:11.327505 kernel: audit: type=1302 audit(1707434411.314:668): item=0 name="/dev/fd/63" inode=18319 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.314000 audit: PATH item=0 name="/dev/fd/63" inode=18319 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.314000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.331892 kernel: audit: type=1327 audit(1707434411.314:668): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.332000 audit[2215]: AVC avc: denied { write } for pid=2215 comm="tee" name="fd" dev="proc" ino=19387 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.340454 kernel: audit: type=1400 audit(1707434411.332:669): avc: denied { write } for pid=2215 comm="tee" name="fd" dev="proc" ino=19387 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.340674 kernel: audit: type=1300 audit(1707434411.332:669): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaf16198b a2=241 a3=1b6 items=1 ppid=2187 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.332000 audit[2215]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaf16198b a2=241 a3=1b6 items=1 ppid=2187 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.332000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 8 23:20:11.332000 audit: PATH item=0 name="/dev/fd/63" inode=19367 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.346124 kernel: audit: type=1307 audit(1707434411.332:669): cwd="/etc/service/enabled/felix/log" Feb 8 23:20:11.346202 kernel: audit: type=1302 audit(1707434411.332:669): item=0 name="/dev/fd/63" inode=19367 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.332000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.333000 audit[2228]: AVC avc: denied { write } for pid=2228 comm="tee" name="fd" dev="proc" ino=19391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.333000 audit[2228]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6442998b a2=241 a3=1b6 items=1 ppid=2181 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.333000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 8 23:20:11.349892 kernel: audit: type=1327 audit(1707434411.332:669): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.333000 audit: PATH item=0 name="/dev/fd/63" inode=20073 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.333000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.335000 audit[2248]: AVC avc: denied { write } for pid=2248 comm="tee" name="fd" dev="proc" ino=20084 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.335000 audit[2248]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeabba998c a2=241 a3=1b6 items=1 ppid=2191 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.335000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 8 23:20:11.335000 audit: PATH item=0 name="/dev/fd/63" inode=20077 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.335000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.347000 audit[2252]: AVC avc: denied { write } for pid=2252 comm="tee" name="fd" dev="proc" ino=20091 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.347000 audit[2252]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd38fa498b a2=241 a3=1b6 items=1 ppid=2188 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.347000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 8 23:20:11.347000 audit: PATH item=0 name="/dev/fd/63" inode=20081 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.347000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.357000 audit[2259]: AVC avc: denied { write } for pid=2259 comm="tee" name="fd" dev="proc" ino=19395 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.357000 audit[2259]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde9ae498d a2=241 a3=1b6 items=1 ppid=2182 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.357000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 8 23:20:11.357000 audit: PATH item=0 name="/dev/fd/63" inode=20095 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.357000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.371000 audit[2264]: AVC avc: denied { write } for pid=2264 comm="tee" name="fd" dev="proc" ino=18326 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:20:11.371000 audit[2264]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf41bf97c a2=241 a3=1b6 items=1 ppid=2195 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.371000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 8 23:20:11.371000 audit: PATH item=0 name="/dev/fd/63" inode=19397 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:11.371000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:20:11.437900 kernel: Initializing XFRM netlink socket Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit: BPF prog-id=81 op=LOAD Feb 8 23:20:11.505000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce5d7f790 a2=70 a3=7f102b76e000 items=0 ppid=2190 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:20:11.505000 audit: BPF prog-id=81 op=UNLOAD Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit: BPF prog-id=82 op=LOAD Feb 8 23:20:11.505000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce5d7f790 a2=70 a3=6e items=0 ppid=2190 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:20:11.505000 audit: BPF prog-id=82 op=UNLOAD Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffce5d7f740 a2=70 a3=7ffce5d7f790 items=0 ppid=2190 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit: BPF prog-id=83 op=LOAD Feb 8 23:20:11.505000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffce5d7f720 a2=70 a3=7ffce5d7f790 items=0 ppid=2190 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:20:11.505000 audit: BPF prog-id=83 op=UNLOAD Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce5d7f800 a2=70 a3=0 items=0 ppid=2190 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce5d7f7f0 a2=70 a3=0 items=0 ppid=2190 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:20:11.505000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.505000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffce5d7f830 a2=70 a3=0 items=0 ppid=2190 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:20:11.506000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.506000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.506000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.506000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.506000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.506000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.506000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.506000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffce5d7f750 a2=70 a3=ffffffff items=0 ppid=2190 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:20:11.511000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.511000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffac4c82a0 a2=70 a3=208 items=0 ppid=2190 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.511000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 8 23:20:11.511000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:11.511000 audit[2332]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffac4c8170 a2=70 a3=3 items=0 ppid=2190 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.511000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 8 23:20:11.520000 audit: BPF prog-id=84 op=UNLOAD Feb 8 23:20:11.550000 audit[2358]: NETFILTER_CFG table=mangle:73 family=2 entries=19 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:11.550000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffcc8d35010 a2=0 a3=7ffcc8d34ffc items=0 ppid=2190 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.550000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:11.554000 audit[2356]: NETFILTER_CFG table=raw:74 family=2 entries=19 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:11.554000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc25cf6e40 a2=0 a3=55d0c3d09000 items=0 ppid=2190 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.554000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:11.556000 audit[2359]: NETFILTER_CFG table=nat:75 family=2 entries=16 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:11.556000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffd2160960 a2=0 a3=55e3f0987000 items=0 ppid=2190 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.556000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:11.556000 audit[2360]: NETFILTER_CFG table=filter:76 family=2 entries=39 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:11.556000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffee5de9b30 a2=0 a3=561c2765f000 items=0 ppid=2190 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:11.556000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:11.800023 kubelet[1428]: E0208 23:20:11.799866 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:11.918878 kubelet[1428]: E0208 23:20:11.918820 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:20:12.447382 systemd-networkd[1019]: vxlan.calico: Link UP Feb 8 23:20:12.447391 systemd-networkd[1019]: vxlan.calico: Gained carrier Feb 8 23:20:12.801059 kubelet[1428]: E0208 23:20:12.800872 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:13.801416 kubelet[1428]: E0208 23:20:13.801352 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:13.830127 systemd-networkd[1019]: vxlan.calico: Gained IPv6LL Feb 8 23:20:13.863553 env[1125]: time="2024-02-08T23:20:13.863507948Z" level=info msg="StopPodSandbox for \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\"" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.898 [INFO][2409] k8s.go 578: Cleaning up netns ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.898 [INFO][2409] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" iface="eth0" netns="/var/run/netns/cni-c027ace2-a414-a8fc-6086-372fd362291f" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.899 [INFO][2409] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" iface="eth0" netns="/var/run/netns/cni-c027ace2-a414-a8fc-6086-372fd362291f" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.899 [INFO][2409] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" iface="eth0" netns="/var/run/netns/cni-c027ace2-a414-a8fc-6086-372fd362291f" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.899 [INFO][2409] k8s.go 585: Releasing IP address(es) ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.899 [INFO][2409] utils.go 188: Calico CNI releasing IP address ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.914 [INFO][2417] ipam_plugin.go 415: Releasing address using handleID ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.914 [INFO][2417] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.914 [INFO][2417] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.920 [WARNING][2417] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.921 [INFO][2417] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.923 [INFO][2417] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:13.925113 env[1125]: 2024-02-08 23:20:13.924 [INFO][2409] k8s.go 591: Teardown processing complete. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:13.925596 env[1125]: time="2024-02-08T23:20:13.925281553Z" level=info msg="TearDown network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\" successfully" Feb 8 23:20:13.925596 env[1125]: time="2024-02-08T23:20:13.925319278Z" level=info msg="StopPodSandbox for \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\" returns successfully" Feb 8 23:20:13.926582 systemd[1]: run-netns-cni\x2dc027ace2\x2da414\x2da8fc\x2d6086\x2d372fd362291f.mount: Deactivated successfully. Feb 8 23:20:13.927535 env[1125]: time="2024-02-08T23:20:13.927483717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b7p95,Uid:ec1960e2-e363-4ba3-a542-3f27f0aa6dc9,Namespace:calico-system,Attempt:1,}" Feb 8 23:20:14.332840 systemd-networkd[1019]: cali9c2116c2775: Link UP Feb 8 23:20:14.334525 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:20:14.334579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9c2116c2775: link becomes ready Feb 8 23:20:14.334811 systemd-networkd[1019]: cali9c2116c2775: Gained carrier Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.281 [INFO][2424] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.51-k8s-csi--node--driver--b7p95-eth0 csi-node-driver- calico-system ec1960e2-e363-4ba3-a542-3f27f0aa6dc9 910 0 2024-02-08 23:19:46 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.51 csi-node-driver-b7p95 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali9c2116c2775 [] []}} ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Namespace="calico-system" Pod="csi-node-driver-b7p95" WorkloadEndpoint="10.0.0.51-k8s-csi--node--driver--b7p95-" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.281 [INFO][2424] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Namespace="calico-system" Pod="csi-node-driver-b7p95" WorkloadEndpoint="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.300 [INFO][2438] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" HandleID="k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.309 [INFO][2438] ipam_plugin.go 268: Auto assigning IP ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" HandleID="k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000599260), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.51", "pod":"csi-node-driver-b7p95", "timestamp":"2024-02-08 23:20:14.300390529 +0000 UTC"}, Hostname:"10.0.0.51", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.309 [INFO][2438] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.309 [INFO][2438] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.309 [INFO][2438] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.51' Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.310 [INFO][2438] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.314 [INFO][2438] ipam.go 372: Looking up existing affinities for host host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.317 [INFO][2438] ipam.go 489: Trying affinity for 192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.319 [INFO][2438] ipam.go 155: Attempting to load block cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.321 [INFO][2438] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.321 [INFO][2438] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.109.192/26 handle="k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.322 [INFO][2438] ipam.go 1682: Creating new handle: k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.325 [INFO][2438] ipam.go 1203: Writing block in order to claim IPs block=192.168.109.192/26 handle="k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.328 [INFO][2438] ipam.go 1216: Successfully claimed IPs: [192.168.109.193/26] block=192.168.109.192/26 handle="k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.328 [INFO][2438] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.109.193/26] handle="k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" host="10.0.0.51" Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.328 [INFO][2438] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:14.342989 env[1125]: 2024-02-08 23:20:14.328 [INFO][2438] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.109.193/26] IPv6=[] ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" HandleID="k8s-pod-network.e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:14.343752 env[1125]: 2024-02-08 23:20:14.331 [INFO][2424] k8s.go 385: Populated endpoint ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Namespace="calico-system" Pod="csi-node-driver-b7p95" WorkloadEndpoint="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-csi--node--driver--b7p95-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9", ResourceVersion:"910", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 19, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"", Pod:"csi-node-driver-b7p95", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9c2116c2775", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:14.343752 env[1125]: 2024-02-08 23:20:14.331 [INFO][2424] k8s.go 386: Calico CNI using IPs: [192.168.109.193/32] ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Namespace="calico-system" Pod="csi-node-driver-b7p95" WorkloadEndpoint="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:14.343752 env[1125]: 2024-02-08 23:20:14.331 [INFO][2424] dataplane_linux.go 68: Setting the host side veth name to cali9c2116c2775 ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Namespace="calico-system" Pod="csi-node-driver-b7p95" WorkloadEndpoint="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:14.343752 env[1125]: 2024-02-08 23:20:14.334 [INFO][2424] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Namespace="calico-system" Pod="csi-node-driver-b7p95" WorkloadEndpoint="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:14.343752 env[1125]: 2024-02-08 23:20:14.334 [INFO][2424] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Namespace="calico-system" Pod="csi-node-driver-b7p95" WorkloadEndpoint="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-csi--node--driver--b7p95-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9", ResourceVersion:"910", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 19, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f", Pod:"csi-node-driver-b7p95", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9c2116c2775", MAC:"22:05:3c:f1:56:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:14.343752 env[1125]: 2024-02-08 23:20:14.341 [INFO][2424] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f" Namespace="calico-system" Pod="csi-node-driver-b7p95" WorkloadEndpoint="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:14.353000 audit[2466]: NETFILTER_CFG table=filter:77 family=2 entries=36 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:14.353000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc671ed450 a2=0 a3=7ffc671ed43c items=0 ppid=2190 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:14.353000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:14.356401 env[1125]: time="2024-02-08T23:20:14.356340977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:20:14.356401 env[1125]: time="2024-02-08T23:20:14.356376529Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:20:14.356401 env[1125]: time="2024-02-08T23:20:14.356387367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:20:14.356526 env[1125]: time="2024-02-08T23:20:14.356484736Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f pid=2470 runtime=io.containerd.runc.v2 Feb 8 23:20:14.370009 systemd[1]: Started cri-containerd-e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f.scope. Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit: BPF prog-id=85 op=LOAD Feb 8 23:20:14.380000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:14.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393131383730633333643335626635366534346534373636653933 Feb 8 23:20:14.380000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.380000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:14.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393131383730633333643335626635366534346534373636653933 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit: BPF prog-id=86 op=LOAD Feb 8 23:20:14.381000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024740 items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:14.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393131383730633333643335626635366534346534373636653933 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit: BPF prog-id=87 op=LOAD Feb 8 23:20:14.381000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024788 items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:14.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393131383730633333643335626635366534346534373636653933 Feb 8 23:20:14.381000 audit: BPF prog-id=87 op=UNLOAD Feb 8 23:20:14.381000 audit: BPF prog-id=86 op=UNLOAD Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:14.381000 audit: BPF prog-id=88 op=LOAD Feb 8 23:20:14.381000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024b98 items=0 ppid=2470 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:14.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393131383730633333643335626635366534346534373636653933 Feb 8 23:20:14.382595 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 8 23:20:14.390435 env[1125]: time="2024-02-08T23:20:14.390397685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-b7p95,Uid:ec1960e2-e363-4ba3-a542-3f27f0aa6dc9,Namespace:calico-system,Attempt:1,} returns sandbox id \"e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f\"" Feb 8 23:20:14.391894 env[1125]: time="2024-02-08T23:20:14.391875609Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 8 23:20:14.801969 kubelet[1428]: E0208 23:20:14.801832 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:14.863355 env[1125]: time="2024-02-08T23:20:14.863229211Z" level=info msg="StopPodSandbox for \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\"" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.894 [INFO][2521] k8s.go 578: Cleaning up netns ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.895 [INFO][2521] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" iface="eth0" netns="/var/run/netns/cni-07f760c0-de93-be5a-8d4f-d46f8d8cacb4" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.895 [INFO][2521] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" iface="eth0" netns="/var/run/netns/cni-07f760c0-de93-be5a-8d4f-d46f8d8cacb4" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.895 [INFO][2521] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" iface="eth0" netns="/var/run/netns/cni-07f760c0-de93-be5a-8d4f-d46f8d8cacb4" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.895 [INFO][2521] k8s.go 585: Releasing IP address(es) ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.895 [INFO][2521] utils.go 188: Calico CNI releasing IP address ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.910 [INFO][2529] ipam_plugin.go 415: Releasing address using handleID ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.910 [INFO][2529] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.910 [INFO][2529] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.917 [WARNING][2529] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.917 [INFO][2529] ipam_plugin.go 443: Releasing address using workloadID ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.918 [INFO][2529] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:14.920677 env[1125]: 2024-02-08 23:20:14.919 [INFO][2521] k8s.go 591: Teardown processing complete. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:14.921485 env[1125]: time="2024-02-08T23:20:14.920798998Z" level=info msg="TearDown network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\" successfully" Feb 8 23:20:14.921485 env[1125]: time="2024-02-08T23:20:14.920834278Z" level=info msg="StopPodSandbox for \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\" returns successfully" Feb 8 23:20:14.921557 env[1125]: time="2024-02-08T23:20:14.921473793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-znfxj,Uid:65904586-615d-4257-878f-40c1373ce461,Namespace:default,Attempt:1,}" Feb 8 23:20:14.926639 systemd[1]: run-netns-cni\x2d07f760c0\x2dde93\x2dbe5a\x2d8d4f\x2dd46f8d8cacb4.mount: Deactivated successfully. Feb 8 23:20:15.105976 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2033a45ecfd: link becomes ready Feb 8 23:20:15.106941 systemd-networkd[1019]: cali2033a45ecfd: Link UP Feb 8 23:20:15.107129 systemd-networkd[1019]: cali2033a45ecfd: Gained carrier Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.961 [INFO][2537] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0 nginx-deployment-6d5f899847- default 65904586-615d-4257-878f-40c1373ce461 918 0 2024-02-08 23:20:02 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.51 nginx-deployment-6d5f899847-znfxj eth0 default [] [] [kns.default ksa.default.default] cali2033a45ecfd [] []}} ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Namespace="default" Pod="nginx-deployment-6d5f899847-znfxj" WorkloadEndpoint="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.961 [INFO][2537] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Namespace="default" Pod="nginx-deployment-6d5f899847-znfxj" WorkloadEndpoint="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.981 [INFO][2551] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" HandleID="k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.990 [INFO][2551] ipam_plugin.go 268: Auto assigning IP ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" HandleID="k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027bbb0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.51", "pod":"nginx-deployment-6d5f899847-znfxj", "timestamp":"2024-02-08 23:20:14.981842768 +0000 UTC"}, Hostname:"10.0.0.51", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.991 [INFO][2551] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.991 [INFO][2551] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.991 [INFO][2551] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.51' Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.992 [INFO][2551] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.995 [INFO][2551] ipam.go 372: Looking up existing affinities for host host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.998 [INFO][2551] ipam.go 489: Trying affinity for 192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:14.999 [INFO][2551] ipam.go 155: Attempting to load block cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:15.001 [INFO][2551] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:15.001 [INFO][2551] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.109.192/26 handle="k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:15.002 [INFO][2551] ipam.go 1682: Creating new handle: k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6 Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:15.004 [INFO][2551] ipam.go 1203: Writing block in order to claim IPs block=192.168.109.192/26 handle="k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:15.098 [INFO][2551] ipam.go 1216: Successfully claimed IPs: [192.168.109.194/26] block=192.168.109.192/26 handle="k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:15.098 [INFO][2551] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.109.194/26] handle="k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" host="10.0.0.51" Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:15.098 [INFO][2551] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:15.113745 env[1125]: 2024-02-08 23:20:15.098 [INFO][2551] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.109.194/26] IPv6=[] ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" HandleID="k8s-pod-network.7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:15.114374 env[1125]: 2024-02-08 23:20:15.102 [INFO][2537] k8s.go 385: Populated endpoint ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Namespace="default" Pod="nginx-deployment-6d5f899847-znfxj" WorkloadEndpoint="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"65904586-615d-4257-878f-40c1373ce461", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"", Pod:"nginx-deployment-6d5f899847-znfxj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2033a45ecfd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:15.114374 env[1125]: 2024-02-08 23:20:15.102 [INFO][2537] k8s.go 386: Calico CNI using IPs: [192.168.109.194/32] ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Namespace="default" Pod="nginx-deployment-6d5f899847-znfxj" WorkloadEndpoint="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:15.114374 env[1125]: 2024-02-08 23:20:15.102 [INFO][2537] dataplane_linux.go 68: Setting the host side veth name to cali2033a45ecfd ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Namespace="default" Pod="nginx-deployment-6d5f899847-znfxj" WorkloadEndpoint="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:15.114374 env[1125]: 2024-02-08 23:20:15.105 [INFO][2537] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Namespace="default" Pod="nginx-deployment-6d5f899847-znfxj" WorkloadEndpoint="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:15.114374 env[1125]: 2024-02-08 23:20:15.105 [INFO][2537] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Namespace="default" Pod="nginx-deployment-6d5f899847-znfxj" WorkloadEndpoint="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"65904586-615d-4257-878f-40c1373ce461", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6", Pod:"nginx-deployment-6d5f899847-znfxj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2033a45ecfd", MAC:"c2:83:48:74:61:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:15.114374 env[1125]: 2024-02-08 23:20:15.112 [INFO][2537] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6" Namespace="default" Pod="nginx-deployment-6d5f899847-znfxj" WorkloadEndpoint="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:15.120000 audit[2574]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:15.120000 audit[2574]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffe430b1220 a2=0 a3=7ffe430b120c items=0 ppid=2190 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:15.120000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:15.127965 env[1125]: time="2024-02-08T23:20:15.127891750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:20:15.127965 env[1125]: time="2024-02-08T23:20:15.127939613Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:20:15.128068 env[1125]: time="2024-02-08T23:20:15.127963475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:20:15.128207 env[1125]: time="2024-02-08T23:20:15.128141264Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6 pid=2582 runtime=io.containerd.runc.v2 Feb 8 23:20:15.140062 systemd[1]: Started cri-containerd-7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6.scope. Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.146000 audit: BPF prog-id=89 op=LOAD Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2582 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:15.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739333762383164343465323235363465373233366436363966343739 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2582 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:15.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739333762383164343465323235363465373233366436363966343739 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit: BPF prog-id=90 op=LOAD Feb 8 23:20:15.147000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024a80 items=0 ppid=2582 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:15.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739333762383164343465323235363465373233366436363966343739 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit: BPF prog-id=91 op=LOAD Feb 8 23:20:15.147000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024ac8 items=0 ppid=2582 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:15.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739333762383164343465323235363465373233366436363966343739 Feb 8 23:20:15.147000 audit: BPF prog-id=91 op=UNLOAD Feb 8 23:20:15.147000 audit: BPF prog-id=90 op=UNLOAD Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:15.147000 audit: BPF prog-id=92 op=LOAD Feb 8 23:20:15.147000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024ed8 items=0 ppid=2582 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:15.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739333762383164343465323235363465373233366436363966343739 Feb 8 23:20:15.149787 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 8 23:20:15.171872 env[1125]: time="2024-02-08T23:20:15.171813879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-znfxj,Uid:65904586-615d-4257-878f-40c1373ce461,Namespace:default,Attempt:1,} returns sandbox id \"7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6\"" Feb 8 23:20:15.429999 systemd-networkd[1019]: cali9c2116c2775: Gained IPv6LL Feb 8 23:20:15.802157 kubelet[1428]: E0208 23:20:15.802114 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:15.978507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3539427217.mount: Deactivated successfully. Feb 8 23:20:16.360865 env[1125]: time="2024-02-08T23:20:16.360795495Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:16.364724 env[1125]: time="2024-02-08T23:20:16.364685247Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:16.366263 env[1125]: time="2024-02-08T23:20:16.366226697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:16.368512 env[1125]: time="2024-02-08T23:20:16.368477326Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:16.369057 env[1125]: time="2024-02-08T23:20:16.369022498Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 8 23:20:16.369914 env[1125]: time="2024-02-08T23:20:16.369890444Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 8 23:20:16.370715 env[1125]: time="2024-02-08T23:20:16.370684149Z" level=info msg="CreateContainer within sandbox \"e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 8 23:20:16.383675 env[1125]: time="2024-02-08T23:20:16.383631782Z" level=info msg="CreateContainer within sandbox \"e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2249b81b34dc6f43dad4252c1c4c93b8cfca43b3ccc9aebe4656eaaa89fe50a7\"" Feb 8 23:20:16.384097 env[1125]: time="2024-02-08T23:20:16.384070728Z" level=info msg="StartContainer for \"2249b81b34dc6f43dad4252c1c4c93b8cfca43b3ccc9aebe4656eaaa89fe50a7\"" Feb 8 23:20:16.400473 systemd[1]: Started cri-containerd-2249b81b34dc6f43dad4252c1c4c93b8cfca43b3ccc9aebe4656eaaa89fe50a7.scope. Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.414275 kernel: kauditd_printk_skb: 236 callbacks suppressed Feb 8 23:20:16.414343 kernel: audit: type=1400 audit(1707434416.412:731): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2470 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:16.420490 kernel: audit: type=1300 audit(1707434416.412:731): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2470 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:16.420552 kernel: audit: type=1327 audit(1707434416.412:731): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962383162333464633666343364616434323532633163346339 Feb 8 23:20:16.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962383162333464633666343364616434323532633163346339 Feb 8 23:20:16.427879 kernel: audit: type=1400 audit(1707434416.412:732): avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.427928 kernel: audit: type=1400 audit(1707434416.412:732): avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.431044 kernel: audit: type=1400 audit(1707434416.412:732): avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.431094 kernel: audit: type=1400 audit(1707434416.412:732): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.437358 kernel: audit: type=1400 audit(1707434416.412:732): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.439424 kernel: audit: type=1400 audit(1707434416.412:732): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.439470 kernel: audit: type=1400 audit(1707434416.412:732): avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.412000 audit: BPF prog-id=93 op=LOAD Feb 8 23:20:16.412000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000efc70 items=0 ppid=2470 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:16.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962383162333464633666343364616434323532633163346339 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.415000 audit: BPF prog-id=94 op=LOAD Feb 8 23:20:16.415000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000efcb8 items=0 ppid=2470 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:16.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962383162333464633666343364616434323532633163346339 Feb 8 23:20:16.423000 audit: BPF prog-id=94 op=UNLOAD Feb 8 23:20:16.423000 audit: BPF prog-id=93 op=UNLOAD Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { perfmon } for pid=2627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit[2627]: AVC avc: denied { bpf } for pid=2627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:16.423000 audit: BPF prog-id=95 op=LOAD Feb 8 23:20:16.423000 audit[2627]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000efd48 items=0 ppid=2470 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:16.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343962383162333464633666343364616434323532633163346339 Feb 8 23:20:16.447317 env[1125]: time="2024-02-08T23:20:16.446732210Z" level=info msg="StartContainer for \"2249b81b34dc6f43dad4252c1c4c93b8cfca43b3ccc9aebe4656eaaa89fe50a7\" returns successfully" Feb 8 23:20:16.454995 systemd-networkd[1019]: cali2033a45ecfd: Gained IPv6LL Feb 8 23:20:16.802600 kubelet[1428]: E0208 23:20:16.802561 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:17.802763 kubelet[1428]: E0208 23:20:17.802701 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:18.116954 update_engine[1113]: I0208 23:20:18.116722 1113 update_attempter.cc:509] Updating boot flags... Feb 8 23:20:18.803515 kubelet[1428]: E0208 23:20:18.803458 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:19.804053 kubelet[1428]: E0208 23:20:19.803998 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:19.924534 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2063255945.mount: Deactivated successfully. Feb 8 23:20:20.805039 kubelet[1428]: E0208 23:20:20.804966 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:21.263969 env[1125]: time="2024-02-08T23:20:21.263907396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:21.265594 env[1125]: time="2024-02-08T23:20:21.265557405Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:21.267219 env[1125]: time="2024-02-08T23:20:21.267171802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:21.268827 env[1125]: time="2024-02-08T23:20:21.268799571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:21.269397 env[1125]: time="2024-02-08T23:20:21.269365459Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 8 23:20:21.269936 env[1125]: time="2024-02-08T23:20:21.269902246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 8 23:20:21.271549 env[1125]: time="2024-02-08T23:20:21.271512454Z" level=info msg="CreateContainer within sandbox \"7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 8 23:20:21.282995 env[1125]: time="2024-02-08T23:20:21.282924784Z" level=info msg="CreateContainer within sandbox \"7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c08791287958edc1afef9227b69e751b50bd66671cff7ebca42b3ebca3f77f76\"" Feb 8 23:20:21.283547 env[1125]: time="2024-02-08T23:20:21.283493847Z" level=info msg="StartContainer for \"c08791287958edc1afef9227b69e751b50bd66671cff7ebca42b3ebca3f77f76\"" Feb 8 23:20:21.300895 systemd[1]: Started cri-containerd-c08791287958edc1afef9227b69e751b50bd66671cff7ebca42b3ebca3f77f76.scope. Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.310000 audit: BPF prog-id=96 op=LOAD Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2582 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:21.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383739313238373935386564633161666566393232376236396537 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2582 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:21.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383739313238373935386564633161666566393232376236396537 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit: BPF prog-id=97 op=LOAD Feb 8 23:20:21.311000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003980d0 items=0 ppid=2582 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:21.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383739313238373935386564633161666566393232376236396537 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit: BPF prog-id=98 op=LOAD Feb 8 23:20:21.311000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000398118 items=0 ppid=2582 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:21.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383739313238373935386564633161666566393232376236396537 Feb 8 23:20:21.311000 audit: BPF prog-id=98 op=UNLOAD Feb 8 23:20:21.311000 audit: BPF prog-id=97 op=UNLOAD Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:21.311000 audit: BPF prog-id=99 op=LOAD Feb 8 23:20:21.311000 audit[2687]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000398528 items=0 ppid=2582 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:21.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383739313238373935386564633161666566393232376236396537 Feb 8 23:20:21.324927 env[1125]: time="2024-02-08T23:20:21.324872670Z" level=info msg="StartContainer for \"c08791287958edc1afef9227b69e751b50bd66671cff7ebca42b3ebca3f77f76\" returns successfully" Feb 8 23:20:21.806139 kubelet[1428]: E0208 23:20:21.806076 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:21.944380 kubelet[1428]: I0208 23:20:21.944340 1428 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-znfxj" podStartSLOduration=13.847694539 podCreationTimestamp="2024-02-08 23:20:02 +0000 UTC" firstStartedPulling="2024-02-08 23:20:15.173060395 +0000 UTC m=+30.875977550" lastFinishedPulling="2024-02-08 23:20:21.269670734 +0000 UTC m=+36.972587909" observedRunningTime="2024-02-08 23:20:21.944061665 +0000 UTC m=+37.646978830" watchObservedRunningTime="2024-02-08 23:20:21.944304898 +0000 UTC m=+37.647222063" Feb 8 23:20:22.279987 systemd[1]: run-containerd-runc-k8s.io-c08791287958edc1afef9227b69e751b50bd66671cff7ebca42b3ebca3f77f76-runc.ooQXT4.mount: Deactivated successfully. Feb 8 23:20:22.806987 kubelet[1428]: E0208 23:20:22.806922 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:23.807108 kubelet[1428]: E0208 23:20:23.807050 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:24.783671 kubelet[1428]: E0208 23:20:24.783604 1428 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:24.808045 kubelet[1428]: E0208 23:20:24.808009 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:24.857000 audit[2745]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:24.861532 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 8 23:20:24.861612 kernel: audit: type=1325 audit(1707434424.857:755): table=filter:79 family=2 entries=20 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:24.861640 kernel: audit: type=1300 audit(1707434424.857:755): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe896e2070 a2=0 a3=7ffe896e205c items=0 ppid=1609 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:24.857000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe896e2070 a2=0 a3=7ffe896e205c items=0 ppid=1609 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:24.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:24.867290 kernel: audit: type=1327 audit(1707434424.857:755): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:24.857000 audit[2745]: NETFILTER_CFG table=nat:80 family=2 entries=20 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:24.857000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe896e2070 a2=0 a3=31030 items=0 ppid=1609 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:24.876293 kernel: audit: type=1325 audit(1707434424.857:756): table=nat:80 family=2 entries=20 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:24.876368 kernel: audit: type=1300 audit(1707434424.857:756): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe896e2070 a2=0 a3=31030 items=0 ppid=1609 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:24.876403 kernel: audit: type=1327 audit(1707434424.857:756): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:24.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:24.875000 audit[2747]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:24.875000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fffb012d8b0 a2=0 a3=7fffb012d89c items=0 ppid=1609 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:24.889195 kernel: audit: type=1325 audit(1707434424.875:757): table=filter:81 family=2 entries=32 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:24.889247 kernel: audit: type=1300 audit(1707434424.875:757): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fffb012d8b0 a2=0 a3=7fffb012d89c items=0 ppid=1609 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:24.889279 kernel: audit: type=1327 audit(1707434424.875:757): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:24.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:24.895157 kubelet[1428]: I0208 23:20:24.895113 1428 topology_manager.go:215] "Topology Admit Handler" podUID="32aa2aeb-a595-4ff6-b325-912701e68f4a" podNamespace="default" podName="nfs-server-provisioner-0" Feb 8 23:20:24.882000 audit[2747]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:24.882000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffb012d8b0 a2=0 a3=31030 items=0 ppid=1609 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:24.882000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:24.900713 systemd[1]: Created slice kubepods-besteffort-pod32aa2aeb_a595_4ff6_b325_912701e68f4a.slice. Feb 8 23:20:24.901187 kernel: audit: type=1325 audit(1707434424.882:758): table=nat:82 family=2 entries=20 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:24.992351 kubelet[1428]: I0208 23:20:24.992292 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dct99\" (UniqueName: \"kubernetes.io/projected/32aa2aeb-a595-4ff6-b325-912701e68f4a-kube-api-access-dct99\") pod \"nfs-server-provisioner-0\" (UID: \"32aa2aeb-a595-4ff6-b325-912701e68f4a\") " pod="default/nfs-server-provisioner-0" Feb 8 23:20:24.992351 kubelet[1428]: I0208 23:20:24.992349 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/32aa2aeb-a595-4ff6-b325-912701e68f4a-data\") pod \"nfs-server-provisioner-0\" (UID: \"32aa2aeb-a595-4ff6-b325-912701e68f4a\") " pod="default/nfs-server-provisioner-0" Feb 8 23:20:25.204322 env[1125]: time="2024-02-08T23:20:25.204135976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:32aa2aeb-a595-4ff6-b325-912701e68f4a,Namespace:default,Attempt:0,}" Feb 8 23:20:25.305976 systemd-networkd[1019]: cali60e51b789ff: Link UP Feb 8 23:20:25.307955 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:20:25.308073 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 8 23:20:25.307965 systemd-networkd[1019]: cali60e51b789ff: Gained carrier Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.248 [INFO][2752] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.51-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 32aa2aeb-a595-4ff6-b325-912701e68f4a 972 0 2024-02-08 23:20:24 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.51 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.51-k8s-nfs--server--provisioner--0-" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.248 [INFO][2752] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.271 [INFO][2765] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" HandleID="k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Workload="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.281 [INFO][2765] ipam_plugin.go 268: Auto assigning IP ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" HandleID="k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Workload="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5bc0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.51", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-08 23:20:25.271799804 +0000 UTC"}, Hostname:"10.0.0.51", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.281 [INFO][2765] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.281 [INFO][2765] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.281 [INFO][2765] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.51' Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.282 [INFO][2765] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.285 [INFO][2765] ipam.go 372: Looking up existing affinities for host host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.288 [INFO][2765] ipam.go 489: Trying affinity for 192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.290 [INFO][2765] ipam.go 155: Attempting to load block cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.291 [INFO][2765] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.292 [INFO][2765] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.109.192/26 handle="k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.293 [INFO][2765] ipam.go 1682: Creating new handle: k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52 Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.296 [INFO][2765] ipam.go 1203: Writing block in order to claim IPs block=192.168.109.192/26 handle="k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.301 [INFO][2765] ipam.go 1216: Successfully claimed IPs: [192.168.109.195/26] block=192.168.109.192/26 handle="k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.301 [INFO][2765] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.109.195/26] handle="k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" host="10.0.0.51" Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.301 [INFO][2765] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:25.316101 env[1125]: 2024-02-08 23:20:25.301 [INFO][2765] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.109.195/26] IPv6=[] ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" HandleID="k8s-pod-network.7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Workload="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:20:25.316994 env[1125]: 2024-02-08 23:20:25.303 [INFO][2752] k8s.go 385: Populated endpoint ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"32aa2aeb-a595-4ff6-b325-912701e68f4a", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.109.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:25.316994 env[1125]: 2024-02-08 23:20:25.303 [INFO][2752] k8s.go 386: Calico CNI using IPs: [192.168.109.195/32] ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:20:25.316994 env[1125]: 2024-02-08 23:20:25.303 [INFO][2752] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:20:25.316994 env[1125]: 2024-02-08 23:20:25.308 [INFO][2752] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:20:25.317182 env[1125]: 2024-02-08 23:20:25.308 [INFO][2752] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"32aa2aeb-a595-4ff6-b325-912701e68f4a", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.109.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"62:78:97:07:12:db", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:25.317182 env[1125]: 2024-02-08 23:20:25.314 [INFO][2752] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.51-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:20:25.327000 audit[2790]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:25.327000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffcbf522490 a2=0 a3=7ffcbf52247c items=0 ppid=2190 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:25.327000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:25.331879 env[1125]: time="2024-02-08T23:20:25.331817548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:20:25.331970 env[1125]: time="2024-02-08T23:20:25.331863551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:20:25.331970 env[1125]: time="2024-02-08T23:20:25.331874460Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:20:25.332070 env[1125]: time="2024-02-08T23:20:25.331976715Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52 pid=2796 runtime=io.containerd.runc.v2 Feb 8 23:20:25.344281 systemd[1]: Started cri-containerd-7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52.scope. Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit: BPF prog-id=100 op=LOAD Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2796 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:25.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383833633430343637343466616661323365336161323830636662 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2796 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:25.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383833633430343637343466616661323365336161323830636662 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit: BPF prog-id=101 op=LOAD Feb 8 23:20:25.354000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024a60 items=0 ppid=2796 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:25.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383833633430343637343466616661323365336161323830636662 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit: BPF prog-id=102 op=LOAD Feb 8 23:20:25.354000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024aa8 items=0 ppid=2796 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:25.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383833633430343637343466616661323365336161323830636662 Feb 8 23:20:25.354000 audit: BPF prog-id=102 op=UNLOAD Feb 8 23:20:25.354000 audit: BPF prog-id=101 op=UNLOAD Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:25.354000 audit: BPF prog-id=103 op=LOAD Feb 8 23:20:25.354000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024eb8 items=0 ppid=2796 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:25.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383833633430343637343466616661323365336161323830636662 Feb 8 23:20:25.356469 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 8 23:20:25.380715 env[1125]: time="2024-02-08T23:20:25.380656409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:32aa2aeb-a595-4ff6-b325-912701e68f4a,Namespace:default,Attempt:0,} returns sandbox id \"7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52\"" Feb 8 23:20:25.814804 kubelet[1428]: E0208 23:20:25.810774 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:26.689490 env[1125]: time="2024-02-08T23:20:26.689389521Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:26.735358 env[1125]: time="2024-02-08T23:20:26.735296476Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:26.762701 env[1125]: time="2024-02-08T23:20:26.761659138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:26.775561 env[1125]: time="2024-02-08T23:20:26.773283336Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:26.775561 env[1125]: time="2024-02-08T23:20:26.773594208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 8 23:20:26.779657 env[1125]: time="2024-02-08T23:20:26.779174412Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 8 23:20:26.789589 env[1125]: time="2024-02-08T23:20:26.785955146Z" level=info msg="CreateContainer within sandbox \"e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 8 23:20:26.815504 kubelet[1428]: E0208 23:20:26.813799 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:26.825674 systemd-networkd[1019]: cali60e51b789ff: Gained IPv6LL Feb 8 23:20:27.020523 env[1125]: time="2024-02-08T23:20:27.019893234Z" level=info msg="CreateContainer within sandbox \"e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4e0b96512c931fc3896fbd2ce7f6d72f75096ea0fd245eb4745601faf713cd5b\"" Feb 8 23:20:27.020744 env[1125]: time="2024-02-08T23:20:27.020524888Z" level=info msg="StartContainer for \"4e0b96512c931fc3896fbd2ce7f6d72f75096ea0fd245eb4745601faf713cd5b\"" Feb 8 23:20:27.042314 systemd[1]: run-containerd-runc-k8s.io-4e0b96512c931fc3896fbd2ce7f6d72f75096ea0fd245eb4745601faf713cd5b-runc.hiya6P.mount: Deactivated successfully. Feb 8 23:20:27.045084 systemd[1]: Started cri-containerd-4e0b96512c931fc3896fbd2ce7f6d72f75096ea0fd245eb4745601faf713cd5b.scope. Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2470 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:27.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306239363531326339333166633338393666626432636537663664 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.061000 audit: BPF prog-id=104 op=LOAD Feb 8 23:20:27.061000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024e60 items=0 ppid=2470 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:27.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306239363531326339333166633338393666626432636537663664 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit: BPF prog-id=105 op=LOAD Feb 8 23:20:27.062000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024ea8 items=0 ppid=2470 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:27.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306239363531326339333166633338393666626432636537663664 Feb 8 23:20:27.062000 audit: BPF prog-id=105 op=UNLOAD Feb 8 23:20:27.062000 audit: BPF prog-id=104 op=UNLOAD Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { perfmon } for pid=2841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit[2841]: AVC avc: denied { bpf } for pid=2841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:27.062000 audit: BPF prog-id=106 op=LOAD Feb 8 23:20:27.062000 audit[2841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024f38 items=0 ppid=2470 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:27.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306239363531326339333166633338393666626432636537663664 Feb 8 23:20:27.076713 env[1125]: time="2024-02-08T23:20:27.076607139Z" level=info msg="StartContainer for \"4e0b96512c931fc3896fbd2ce7f6d72f75096ea0fd245eb4745601faf713cd5b\" returns successfully" Feb 8 23:20:27.814891 kubelet[1428]: E0208 23:20:27.814808 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:27.860918 kubelet[1428]: I0208 23:20:27.860871 1428 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 8 23:20:27.860918 kubelet[1428]: I0208 23:20:27.860914 1428 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 8 23:20:27.993311 kubelet[1428]: I0208 23:20:27.993159 1428 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-b7p95" podStartSLOduration=29.606836466 podCreationTimestamp="2024-02-08 23:19:46 +0000 UTC" firstStartedPulling="2024-02-08 23:20:14.391590407 +0000 UTC m=+30.094507572" lastFinishedPulling="2024-02-08 23:20:26.77787311 +0000 UTC m=+42.480790275" observedRunningTime="2024-02-08 23:20:27.992847727 +0000 UTC m=+43.695764892" watchObservedRunningTime="2024-02-08 23:20:27.993119169 +0000 UTC m=+43.696036334" Feb 8 23:20:28.815303 kubelet[1428]: E0208 23:20:28.815247 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:29.388728 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount792841369.mount: Deactivated successfully. Feb 8 23:20:29.827196 kubelet[1428]: E0208 23:20:29.825388 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:30.841747 kubelet[1428]: E0208 23:20:30.833374 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:31.019422 kubelet[1428]: E0208 23:20:31.019388 1428 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 8 23:20:31.842386 kubelet[1428]: E0208 23:20:31.842344 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:32.473525 env[1125]: time="2024-02-08T23:20:32.473329338Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:32.477352 env[1125]: time="2024-02-08T23:20:32.477218351Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:32.480274 env[1125]: time="2024-02-08T23:20:32.480159380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:32.483713 env[1125]: time="2024-02-08T23:20:32.483643122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:32.484193 env[1125]: time="2024-02-08T23:20:32.484131054Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 8 23:20:32.487945 env[1125]: time="2024-02-08T23:20:32.487806167Z" level=info msg="CreateContainer within sandbox \"7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 8 23:20:32.528937 env[1125]: time="2024-02-08T23:20:32.528660488Z" level=info msg="CreateContainer within sandbox \"7b883c4046744fafa23e3aa280cfb160c884df94fd3a868e539ab928e8fa3b52\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"66ae8c287075ff8db8197d820ef0983f2180cc2e1164721ee2f4d90953b8623d\"" Feb 8 23:20:32.530531 env[1125]: time="2024-02-08T23:20:32.530290740Z" level=info msg="StartContainer for \"66ae8c287075ff8db8197d820ef0983f2180cc2e1164721ee2f4d90953b8623d\"" Feb 8 23:20:32.558026 systemd[1]: Started cri-containerd-66ae8c287075ff8db8197d820ef0983f2180cc2e1164721ee2f4d90953b8623d.scope. Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.571281 kernel: kauditd_printk_skb: 105 callbacks suppressed Feb 8 23:20:32.571365 kernel: audit: type=1400 audit(1707434432.569:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.583072 kernel: audit: type=1400 audit(1707434432.569:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.583246 kernel: audit: type=1400 audit(1707434432.569:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.583268 kernel: audit: type=1400 audit(1707434432.569:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.583287 kernel: audit: type=1400 audit(1707434432.569:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.583304 kernel: audit: type=1400 audit(1707434432.569:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.587061 kernel: audit: type=1400 audit(1707434432.569:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.587135 kernel: audit: type=1400 audit(1707434432.569:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.591271 kernel: audit: type=1400 audit(1707434432.569:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.591339 kernel: audit: type=1400 audit(1707434432.572:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.572000 audit: BPF prog-id=107 op=LOAD Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2796 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:32.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636616538633238373037356666386462383139376438323065663039 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2796 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:32.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636616538633238373037356666386462383139376438323065663039 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.573000 audit: BPF prog-id=108 op=LOAD Feb 8 23:20:32.573000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003b49e0 items=0 ppid=2796 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:32.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636616538633238373037356666386462383139376438323065663039 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.579000 audit: BPF prog-id=109 op=LOAD Feb 8 23:20:32.579000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003b4a28 items=0 ppid=2796 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:32.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636616538633238373037356666386462383139376438323065663039 Feb 8 23:20:32.581000 audit: BPF prog-id=109 op=UNLOAD Feb 8 23:20:32.581000 audit: BPF prog-id=108 op=UNLOAD Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:32.581000 audit: BPF prog-id=110 op=LOAD Feb 8 23:20:32.581000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b4e38 items=0 ppid=2796 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:32.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636616538633238373037356666386462383139376438323065663039 Feb 8 23:20:32.608785 env[1125]: time="2024-02-08T23:20:32.608728271Z" level=info msg="StartContainer for \"66ae8c287075ff8db8197d820ef0983f2180cc2e1164721ee2f4d90953b8623d\" returns successfully" Feb 8 23:20:32.645000 audit[2941]: AVC avc: denied { search } for pid=2941 comm="rpcbind" name="crypto" dev="proc" ino=21109 scontext=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:20:32.645000 audit[2941]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0beee960c0 a2=0 a3=0 items=0 ppid=2922 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 key=(null) Feb 8 23:20:32.645000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 8 23:20:32.682000 audit[2946]: AVC avc: denied { search } for pid=2946 comm="dbus-daemon" name="crypto" dev="proc" ino=21109 scontext=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:20:32.682000 audit[2946]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5fa4c7a0c0 a2=0 a3=0 items=0 ppid=2922 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 key=(null) Feb 8 23:20:32.682000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 8 23:20:32.685000 audit[2947]: AVC avc: denied { watch } for pid=2947 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c549,c945 tclass=dir permissive=0 Feb 8 23:20:32.685000 audit[2947]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55832b195970 a2=2c8 a3=7ffd9db2cfcc items=0 ppid=2922 pid=2947 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 key=(null) Feb 8 23:20:32.685000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 8 23:20:32.688000 audit[2948]: AVC avc: denied { read } for pid=2948 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21134 scontext=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 8 23:20:32.688000 audit[2948]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f5e17d07320 a1=80000 a2=d a3=7ffe63cd38c0 items=0 ppid=2922 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 key=(null) Feb 8 23:20:32.688000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 8 23:20:32.689000 audit[2948]: AVC avc: denied { search } for pid=2948 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21109 scontext=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:20:32.689000 audit[2948]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5e1725b0c0 a2=0 a3=0 items=0 ppid=2922 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c549,c945 key=(null) Feb 8 23:20:32.689000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 8 23:20:32.842903 kubelet[1428]: E0208 23:20:32.842817 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:33.032237 kubelet[1428]: I0208 23:20:33.032134 1428 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.929666161 podCreationTimestamp="2024-02-08 23:20:24 +0000 UTC" firstStartedPulling="2024-02-08 23:20:25.382069266 +0000 UTC m=+41.084986432" lastFinishedPulling="2024-02-08 23:20:32.484481105 +0000 UTC m=+48.187398260" observedRunningTime="2024-02-08 23:20:33.031917345 +0000 UTC m=+48.734834520" watchObservedRunningTime="2024-02-08 23:20:33.032077989 +0000 UTC m=+48.734995164" Feb 8 23:20:33.052000 audit[2965]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:33.052000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc02077f10 a2=0 a3=7ffc02077efc items=0 ppid=1609 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:33.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:33.056000 audit[2965]: NETFILTER_CFG table=nat:85 family=2 entries=104 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:33.056000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffc02077f10 a2=0 a3=7ffc02077efc items=0 ppid=1609 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:33.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:33.293000 audit[2968]: NETFILTER_CFG table=filter:86 family=2 entries=9 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:33.293000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe748d9950 a2=0 a3=7ffe748d993c items=0 ppid=1609 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:33.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:33.295000 audit[2968]: NETFILTER_CFG table=nat:87 family=2 entries=44 op=nft_register_rule pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:33.295000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffe748d9950 a2=0 a3=7ffe748d993c items=0 ppid=1609 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:33.295000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:33.301830 kubelet[1428]: I0208 23:20:33.301786 1428 topology_manager.go:215] "Topology Admit Handler" podUID="44dcba15-b19c-4b1f-b8ac-f548e8aa697c" podNamespace="calico-apiserver" podName="calico-apiserver-68d8676795-zrpdb" Feb 8 23:20:33.306792 systemd[1]: Created slice kubepods-besteffort-pod44dcba15_b19c_4b1f_b8ac_f548e8aa697c.slice. Feb 8 23:20:33.496081 kubelet[1428]: I0208 23:20:33.492211 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/44dcba15-b19c-4b1f-b8ac-f548e8aa697c-calico-apiserver-certs\") pod \"calico-apiserver-68d8676795-zrpdb\" (UID: \"44dcba15-b19c-4b1f-b8ac-f548e8aa697c\") " pod="calico-apiserver/calico-apiserver-68d8676795-zrpdb" Feb 8 23:20:33.496081 kubelet[1428]: I0208 23:20:33.492278 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-slmd4\" (UniqueName: \"kubernetes.io/projected/44dcba15-b19c-4b1f-b8ac-f548e8aa697c-kube-api-access-slmd4\") pod \"calico-apiserver-68d8676795-zrpdb\" (UID: \"44dcba15-b19c-4b1f-b8ac-f548e8aa697c\") " pod="calico-apiserver/calico-apiserver-68d8676795-zrpdb" Feb 8 23:20:33.595116 kubelet[1428]: E0208 23:20:33.594787 1428 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 8 23:20:33.597116 kubelet[1428]: E0208 23:20:33.597004 1428 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/44dcba15-b19c-4b1f-b8ac-f548e8aa697c-calico-apiserver-certs podName:44dcba15-b19c-4b1f-b8ac-f548e8aa697c nodeName:}" failed. No retries permitted until 2024-02-08 23:20:34.09695888 +0000 UTC m=+49.799876045 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/44dcba15-b19c-4b1f-b8ac-f548e8aa697c-calico-apiserver-certs") pod "calico-apiserver-68d8676795-zrpdb" (UID: "44dcba15-b19c-4b1f-b8ac-f548e8aa697c") : secret "calico-apiserver-certs" not found Feb 8 23:20:33.844218 kubelet[1428]: E0208 23:20:33.844020 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:34.210585 env[1125]: time="2024-02-08T23:20:34.210487552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68d8676795-zrpdb,Uid:44dcba15-b19c-4b1f-b8ac-f548e8aa697c,Namespace:calico-apiserver,Attempt:0,}" Feb 8 23:20:34.307000 audit[2972]: NETFILTER_CFG table=filter:88 family=2 entries=10 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:34.307000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffc1f20d60 a2=0 a3=7fffc1f20d4c items=0 ppid=1609 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:34.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:34.309000 audit[2972]: NETFILTER_CFG table=nat:89 family=2 entries=44 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:34.309000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fffc1f20d60 a2=0 a3=7fffc1f20d4c items=0 ppid=1609 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:34.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:34.774666 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:20:34.774845 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib7b67ffd158: link becomes ready Feb 8 23:20:34.779885 systemd-networkd[1019]: calib7b67ffd158: Link UP Feb 8 23:20:34.780196 systemd-networkd[1019]: calib7b67ffd158: Gained carrier Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.458 [INFO][2974] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0 calico-apiserver-68d8676795- calico-apiserver 44dcba15-b19c-4b1f-b8ac-f548e8aa697c 1067 0 2024-02-08 23:20:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:68d8676795 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.51 calico-apiserver-68d8676795-zrpdb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib7b67ffd158 [] []}} ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Namespace="calico-apiserver" Pod="calico-apiserver-68d8676795-zrpdb" WorkloadEndpoint="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.458 [INFO][2974] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Namespace="calico-apiserver" Pod="calico-apiserver-68d8676795-zrpdb" WorkloadEndpoint="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.485 [INFO][2987] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" HandleID="k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Workload="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.508 [INFO][2987] ipam_plugin.go 268: Auto assigning IP ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" HandleID="k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Workload="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029fb70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.51", "pod":"calico-apiserver-68d8676795-zrpdb", "timestamp":"2024-02-08 23:20:34.485949041 +0000 UTC"}, Hostname:"10.0.0.51", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.508 [INFO][2987] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.508 [INFO][2987] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.508 [INFO][2987] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.51' Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.511 [INFO][2987] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.531 [INFO][2987] ipam.go 372: Looking up existing affinities for host host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.546 [INFO][2987] ipam.go 489: Trying affinity for 192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.551 [INFO][2987] ipam.go 155: Attempting to load block cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.578 [INFO][2987] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.578 [INFO][2987] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.109.192/26 handle="k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.619 [INFO][2987] ipam.go 1682: Creating new handle: k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230 Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.736 [INFO][2987] ipam.go 1203: Writing block in order to claim IPs block=192.168.109.192/26 handle="k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.751 [INFO][2987] ipam.go 1216: Successfully claimed IPs: [192.168.109.196/26] block=192.168.109.192/26 handle="k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.751 [INFO][2987] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.109.196/26] handle="k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" host="10.0.0.51" Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.752 [INFO][2987] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:34.843685 env[1125]: 2024-02-08 23:20:34.752 [INFO][2987] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.109.196/26] IPv6=[] ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" HandleID="k8s-pod-network.9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Workload="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" Feb 8 23:20:34.844641 env[1125]: 2024-02-08 23:20:34.770 [INFO][2974] k8s.go 385: Populated endpoint ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Namespace="calico-apiserver" Pod="calico-apiserver-68d8676795-zrpdb" WorkloadEndpoint="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0", GenerateName:"calico-apiserver-68d8676795-", Namespace:"calico-apiserver", SelfLink:"", UID:"44dcba15-b19c-4b1f-b8ac-f548e8aa697c", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68d8676795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"", Pod:"calico-apiserver-68d8676795-zrpdb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.109.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib7b67ffd158", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:34.844641 env[1125]: 2024-02-08 23:20:34.770 [INFO][2974] k8s.go 386: Calico CNI using IPs: [192.168.109.196/32] ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Namespace="calico-apiserver" Pod="calico-apiserver-68d8676795-zrpdb" WorkloadEndpoint="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" Feb 8 23:20:34.844641 env[1125]: 2024-02-08 23:20:34.771 [INFO][2974] dataplane_linux.go 68: Setting the host side veth name to calib7b67ffd158 ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Namespace="calico-apiserver" Pod="calico-apiserver-68d8676795-zrpdb" WorkloadEndpoint="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" Feb 8 23:20:34.844641 env[1125]: 2024-02-08 23:20:34.775 [INFO][2974] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Namespace="calico-apiserver" Pod="calico-apiserver-68d8676795-zrpdb" WorkloadEndpoint="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" Feb 8 23:20:34.844641 env[1125]: 2024-02-08 23:20:34.794 [INFO][2974] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Namespace="calico-apiserver" Pod="calico-apiserver-68d8676795-zrpdb" WorkloadEndpoint="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0", GenerateName:"calico-apiserver-68d8676795-", Namespace:"calico-apiserver", SelfLink:"", UID:"44dcba15-b19c-4b1f-b8ac-f548e8aa697c", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"68d8676795", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230", Pod:"calico-apiserver-68d8676795-zrpdb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.109.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib7b67ffd158", MAC:"22:62:d8:1a:19:0d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:34.844641 env[1125]: 2024-02-08 23:20:34.821 [INFO][2974] k8s.go 491: Wrote updated endpoint to datastore ContainerID="9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230" Namespace="calico-apiserver" Pod="calico-apiserver-68d8676795-zrpdb" WorkloadEndpoint="10.0.0.51-k8s-calico--apiserver--68d8676795--zrpdb-eth0" Feb 8 23:20:34.845011 kubelet[1428]: E0208 23:20:34.844963 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:34.869000 audit[3013]: NETFILTER_CFG table=filter:90 family=2 entries=55 op=nft_register_chain pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:34.869000 audit[3013]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffccc6c1710 a2=0 a3=7ffccc6c16fc items=0 ppid=2190 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:34.869000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:35.067258 env[1125]: time="2024-02-08T23:20:35.067073694Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:20:35.067258 env[1125]: time="2024-02-08T23:20:35.067130648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:20:35.067258 env[1125]: time="2024-02-08T23:20:35.067143933Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:20:35.067945 env[1125]: time="2024-02-08T23:20:35.067682642Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230 pid=3021 runtime=io.containerd.runc.v2 Feb 8 23:20:35.083254 systemd[1]: run-containerd-runc-k8s.io-9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230-runc.kf46VJ.mount: Deactivated successfully. Feb 8 23:20:35.085928 systemd[1]: Started cri-containerd-9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230.scope. Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.096000 audit: BPF prog-id=111 op=LOAD Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3021 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:35.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373937313966656366663365396363383163663263633435656664 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3021 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:35.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373937313966656366663365396363383163663263633435656664 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit: BPF prog-id=112 op=LOAD Feb 8 23:20:35.097000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000244160 items=0 ppid=3021 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:35.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373937313966656366663365396363383163663263633435656664 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit: BPF prog-id=113 op=LOAD Feb 8 23:20:35.097000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002441a8 items=0 ppid=3021 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:35.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373937313966656366663365396363383163663263633435656664 Feb 8 23:20:35.097000 audit: BPF prog-id=113 op=UNLOAD Feb 8 23:20:35.097000 audit: BPF prog-id=112 op=UNLOAD Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:35.097000 audit: BPF prog-id=114 op=LOAD Feb 8 23:20:35.097000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002445b8 items=0 ppid=3021 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:35.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373937313966656366663365396363383163663263633435656664 Feb 8 23:20:35.099013 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 8 23:20:35.127013 env[1125]: time="2024-02-08T23:20:35.126967183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-68d8676795-zrpdb,Uid:44dcba15-b19c-4b1f-b8ac-f548e8aa697c,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230\"" Feb 8 23:20:35.128691 env[1125]: time="2024-02-08T23:20:35.128658380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 8 23:20:35.845832 kubelet[1428]: E0208 23:20:35.845795 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:36.486087 systemd-networkd[1019]: calib7b67ffd158: Gained IPv6LL Feb 8 23:20:36.845984 kubelet[1428]: E0208 23:20:36.845934 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:37.846140 kubelet[1428]: E0208 23:20:37.846076 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:38.846740 kubelet[1428]: E0208 23:20:38.846683 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:39.331982 env[1125]: time="2024-02-08T23:20:39.331917771Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:39.334018 env[1125]: time="2024-02-08T23:20:39.333966273Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:39.336224 env[1125]: time="2024-02-08T23:20:39.336168637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:39.338247 env[1125]: time="2024-02-08T23:20:39.338214303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:39.338889 env[1125]: time="2024-02-08T23:20:39.338844486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 8 23:20:39.340939 env[1125]: time="2024-02-08T23:20:39.340907685Z" level=info msg="CreateContainer within sandbox \"9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 8 23:20:39.351932 env[1125]: time="2024-02-08T23:20:39.351874995Z" level=info msg="CreateContainer within sandbox \"9679719fecff3e9cc81cf2cc45efdb25180b3df7251e6996b40e20ddf4a2b230\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c2bd02da21bef0be2523f90861176fdb76bf2842dce622fa5f806ed67770bbaf\"" Feb 8 23:20:39.352469 env[1125]: time="2024-02-08T23:20:39.352435034Z" level=info msg="StartContainer for \"c2bd02da21bef0be2523f90861176fdb76bf2842dce622fa5f806ed67770bbaf\"" Feb 8 23:20:39.370531 systemd[1]: Started cri-containerd-c2bd02da21bef0be2523f90861176fdb76bf2842dce622fa5f806ed67770bbaf.scope. Feb 8 23:20:39.385112 kernel: kauditd_printk_skb: 140 callbacks suppressed Feb 8 23:20:39.385213 kernel: audit: type=1400 audit(1707434439.381:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.385240 kernel: audit: type=1400 audit(1707434439.381:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.389058 kernel: audit: type=1400 audit(1707434439.381:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.389103 kernel: audit: type=1400 audit(1707434439.381:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.393099 kernel: audit: type=1400 audit(1707434439.381:836): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.393143 kernel: audit: type=1400 audit(1707434439.381:837): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.397131 kernel: audit: type=1400 audit(1707434439.381:838): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.397173 kernel: audit: type=1400 audit(1707434439.381:839): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.401222 kernel: audit: type=1400 audit(1707434439.381:840): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.401284 kernel: audit: type=1400 audit(1707434439.381:841): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit: BPF prog-id=115 op=LOAD Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00013dc48 a2=10 a3=1c items=0 ppid=3021 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:39.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626430326461323162656630626532353233663930383631313736 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00013d6b0 a2=3c a3=8 items=0 ppid=3021 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:39.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626430326461323162656630626532353233663930383631313736 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.381000 audit: BPF prog-id=116 op=LOAD Feb 8 23:20:39.381000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013d9d8 a2=78 a3=c0000258a0 items=0 ppid=3021 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:39.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626430326461323162656630626532353233663930383631313736 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.384000 audit: BPF prog-id=117 op=LOAD Feb 8 23:20:39.384000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00013d770 a2=78 a3=c0000258e8 items=0 ppid=3021 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:39.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626430326461323162656630626532353233663930383631313736 Feb 8 23:20:39.388000 audit: BPF prog-id=117 op=UNLOAD Feb 8 23:20:39.388000 audit: BPF prog-id=116 op=UNLOAD Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { perfmon } for pid=3062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit[3062]: AVC avc: denied { bpf } for pid=3062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:39.388000 audit: BPF prog-id=118 op=LOAD Feb 8 23:20:39.388000 audit[3062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013dc30 a2=78 a3=c000025cf8 items=0 ppid=3021 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:39.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626430326461323162656630626532353233663930383631313736 Feb 8 23:20:39.425212 env[1125]: time="2024-02-08T23:20:39.425136161Z" level=info msg="StartContainer for \"c2bd02da21bef0be2523f90861176fdb76bf2842dce622fa5f806ed67770bbaf\" returns successfully" Feb 8 23:20:39.847024 kubelet[1428]: E0208 23:20:39.846969 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:39.957000 audit[3072]: AVC avc: denied { watch } for pid=3072 comm="apiserver" path="/calico-apiserver-certs/..2024_02_08_23_20_34.2764386582/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c696 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c311,c696 tclass=file permissive=0 Feb 8 23:20:39.957000 audit[3072]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a52f00 a2=fc6 a3=0 items=0 ppid=3021 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c696 key=(null) Feb 8 23:20:39.957000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 8 23:20:40.039000 audit[3096]: NETFILTER_CFG table=filter:91 family=2 entries=10 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:40.039000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc07b016d0 a2=0 a3=7ffc07b016bc items=0 ppid=1609 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:40.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:40.041000 audit[3096]: NETFILTER_CFG table=nat:92 family=2 entries=44 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:40.041000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc07b016d0 a2=0 a3=7ffc07b016bc items=0 ppid=1609 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:40.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:40.264000 audit[3098]: NETFILTER_CFG table=filter:93 family=2 entries=10 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:40.264000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff32216850 a2=0 a3=7fff3221683c items=0 ppid=1609 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:40.264000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:40.265000 audit[3098]: NETFILTER_CFG table=nat:94 family=2 entries=44 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:20:40.265000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7fff32216850 a2=0 a3=7fff3221683c items=0 ppid=1609 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:40.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:20:40.348848 systemd[1]: run-containerd-runc-k8s.io-c2bd02da21bef0be2523f90861176fdb76bf2842dce622fa5f806ed67770bbaf-runc.6MYYKV.mount: Deactivated successfully. Feb 8 23:20:40.847633 kubelet[1428]: E0208 23:20:40.847571 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:41.848623 kubelet[1428]: E0208 23:20:41.848560 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:42.849226 kubelet[1428]: E0208 23:20:42.849185 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:43.850194 kubelet[1428]: E0208 23:20:43.850157 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:44.783140 kubelet[1428]: E0208 23:20:44.783106 1428 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:44.788183 env[1125]: time="2024-02-08T23:20:44.788133020Z" level=info msg="StopPodSandbox for \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\"" Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.815 [WARNING][3116] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"65904586-615d-4257-878f-40c1373ce461", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6", Pod:"nginx-deployment-6d5f899847-znfxj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2033a45ecfd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.815 [INFO][3116] k8s.go 578: Cleaning up netns ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.815 [INFO][3116] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" iface="eth0" netns="" Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.815 [INFO][3116] k8s.go 585: Releasing IP address(es) ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.815 [INFO][3116] utils.go 188: Calico CNI releasing IP address ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.828 [INFO][3123] ipam_plugin.go 415: Releasing address using handleID ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.829 [INFO][3123] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.829 [INFO][3123] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.834 [WARNING][3123] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.834 [INFO][3123] ipam_plugin.go 443: Releasing address using workloadID ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.835 [INFO][3123] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:44.837511 env[1125]: 2024-02-08 23:20:44.836 [INFO][3116] k8s.go 591: Teardown processing complete. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:44.838143 env[1125]: time="2024-02-08T23:20:44.837546426Z" level=info msg="TearDown network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\" successfully" Feb 8 23:20:44.838143 env[1125]: time="2024-02-08T23:20:44.837585159Z" level=info msg="StopPodSandbox for \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\" returns successfully" Feb 8 23:20:44.838143 env[1125]: time="2024-02-08T23:20:44.838085763Z" level=info msg="RemovePodSandbox for \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\"" Feb 8 23:20:44.838222 env[1125]: time="2024-02-08T23:20:44.838110961Z" level=info msg="Forcibly stopping sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\"" Feb 8 23:20:44.850482 kubelet[1428]: E0208 23:20:44.850444 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.864 [WARNING][3145] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"65904586-615d-4257-878f-40c1373ce461", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"7937b81d44e22564e7236d669f47909a3af2a203a263348a8cc2222f5d69caf6", Pod:"nginx-deployment-6d5f899847-znfxj", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2033a45ecfd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.864 [INFO][3145] k8s.go 578: Cleaning up netns ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.864 [INFO][3145] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" iface="eth0" netns="" Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.864 [INFO][3145] k8s.go 585: Releasing IP address(es) ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.864 [INFO][3145] utils.go 188: Calico CNI releasing IP address ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.880 [INFO][3154] ipam_plugin.go 415: Releasing address using handleID ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.880 [INFO][3154] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.880 [INFO][3154] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.889 [WARNING][3154] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.889 [INFO][3154] ipam_plugin.go 443: Releasing address using workloadID ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" HandleID="k8s-pod-network.15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Workload="10.0.0.51-k8s-nginx--deployment--6d5f899847--znfxj-eth0" Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.890 [INFO][3154] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:44.893361 env[1125]: 2024-02-08 23:20:44.891 [INFO][3145] k8s.go 591: Teardown processing complete. ContainerID="15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132" Feb 8 23:20:44.893969 env[1125]: time="2024-02-08T23:20:44.893374860Z" level=info msg="TearDown network for sandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\" successfully" Feb 8 23:20:44.896352 env[1125]: time="2024-02-08T23:20:44.896327804Z" level=info msg="RemovePodSandbox \"15790d99e95d0a06b4eb2d0fb0127cd6ac8632bac1d2b9a8dcb420ed478d0132\" returns successfully" Feb 8 23:20:44.899454 env[1125]: time="2024-02-08T23:20:44.899426808Z" level=info msg="StopPodSandbox for \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\"" Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.925 [WARNING][3180] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-csi--node--driver--b7p95-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 19, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f", Pod:"csi-node-driver-b7p95", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9c2116c2775", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.925 [INFO][3180] k8s.go 578: Cleaning up netns ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.925 [INFO][3180] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" iface="eth0" netns="" Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.925 [INFO][3180] k8s.go 585: Releasing IP address(es) ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.925 [INFO][3180] utils.go 188: Calico CNI releasing IP address ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.940 [INFO][3187] ipam_plugin.go 415: Releasing address using handleID ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.940 [INFO][3187] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.940 [INFO][3187] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.946 [WARNING][3187] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.947 [INFO][3187] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.948 [INFO][3187] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:44.950200 env[1125]: 2024-02-08 23:20:44.949 [INFO][3180] k8s.go 591: Teardown processing complete. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:44.950833 env[1125]: time="2024-02-08T23:20:44.950223107Z" level=info msg="TearDown network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\" successfully" Feb 8 23:20:44.950833 env[1125]: time="2024-02-08T23:20:44.950257152Z" level=info msg="StopPodSandbox for \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\" returns successfully" Feb 8 23:20:44.950833 env[1125]: time="2024-02-08T23:20:44.950707900Z" level=info msg="RemovePodSandbox for \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\"" Feb 8 23:20:44.950833 env[1125]: time="2024-02-08T23:20:44.950732788Z" level=info msg="Forcibly stopping sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\"" Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.978 [WARNING][3210] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-csi--node--driver--b7p95-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ec1960e2-e363-4ba3-a542-3f27f0aa6dc9", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 19, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"e6911870c33d35bf56e44e4766e937bb3393e93b366d6b04f7edc46f1434ad7f", Pod:"csi-node-driver-b7p95", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9c2116c2775", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.979 [INFO][3210] k8s.go 578: Cleaning up netns ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.979 [INFO][3210] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" iface="eth0" netns="" Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.979 [INFO][3210] k8s.go 585: Releasing IP address(es) ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.979 [INFO][3210] utils.go 188: Calico CNI releasing IP address ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.992 [INFO][3217] ipam_plugin.go 415: Releasing address using handleID ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.992 [INFO][3217] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.992 [INFO][3217] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.998 [WARNING][3217] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.998 [INFO][3217] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" HandleID="k8s-pod-network.5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Workload="10.0.0.51-k8s-csi--node--driver--b7p95-eth0" Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:44.999 [INFO][3217] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:45.001521 env[1125]: 2024-02-08 23:20:45.000 [INFO][3210] k8s.go 591: Teardown processing complete. ContainerID="5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c" Feb 8 23:20:45.002116 env[1125]: time="2024-02-08T23:20:45.001600802Z" level=info msg="TearDown network for sandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\" successfully" Feb 8 23:20:45.004736 env[1125]: time="2024-02-08T23:20:45.004708460Z" level=info msg="RemovePodSandbox \"5dea30ada1110e868b9dfcc0d5dbadc41cb6c3b3eb4ea256cf236fb43cf7260c\" returns successfully" Feb 8 23:20:45.850990 kubelet[1428]: E0208 23:20:45.850951 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:46.851258 kubelet[1428]: E0208 23:20:46.851219 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:46.964674 kubelet[1428]: I0208 23:20:46.964633 1428 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-68d8676795-zrpdb" podStartSLOduration=9.753783847 podCreationTimestamp="2024-02-08 23:20:33 +0000 UTC" firstStartedPulling="2024-02-08 23:20:35.128351867 +0000 UTC m=+50.831269032" lastFinishedPulling="2024-02-08 23:20:39.339166451 +0000 UTC m=+55.042083616" observedRunningTime="2024-02-08 23:20:40.024825154 +0000 UTC m=+55.727742319" watchObservedRunningTime="2024-02-08 23:20:46.964598431 +0000 UTC m=+62.667515596" Feb 8 23:20:46.964914 kubelet[1428]: I0208 23:20:46.964758 1428 topology_manager.go:215] "Topology Admit Handler" podUID="4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25" podNamespace="default" podName="test-pod-1" Feb 8 23:20:46.969115 systemd[1]: Created slice kubepods-besteffort-pod4aa8b7e5_dd12_45b8_a1c0_a9c05dd6cb25.slice. Feb 8 23:20:47.077715 kubelet[1428]: I0208 23:20:47.077685 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j875t\" (UniqueName: \"kubernetes.io/projected/4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25-kube-api-access-j875t\") pod \"test-pod-1\" (UID: \"4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25\") " pod="default/test-pod-1" Feb 8 23:20:47.077829 kubelet[1428]: I0208 23:20:47.077745 1428 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-237e9465-0b5f-43d5-be94-6d6ed58356b7\" (UniqueName: \"kubernetes.io/nfs/4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25-pvc-237e9465-0b5f-43d5-be94-6d6ed58356b7\") pod \"test-pod-1\" (UID: \"4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25\") " pod="default/test-pod-1" Feb 8 23:20:47.191341 kernel: Failed to create system directory netfs Feb 8 23:20:47.191439 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 8 23:20:47.191456 kernel: audit: type=1400 audit(1707434447.186:855): avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.191495 kernel: Failed to create system directory netfs Feb 8 23:20:47.191515 kernel: audit: type=1400 audit(1707434447.186:855): avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.192075 kernel: Failed to create system directory netfs Feb 8 23:20:47.186000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.186000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.186000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.194586 kernel: audit: type=1400 audit(1707434447.186:855): avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.194638 kernel: Failed to create system directory netfs Feb 8 23:20:47.186000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.199947 kernel: audit: type=1400 audit(1707434447.186:855): avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.186000 audit[3227]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5629889cf5e0 a1=153bc a2=562986e132b0 a3=5 items=0 ppid=1056 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.203709 kernel: audit: type=1300 audit(1707434447.186:855): arch=c000003e syscall=175 success=yes exit=0 a0=5629889cf5e0 a1=153bc a2=562986e132b0 a3=5 items=0 ppid=1056 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.203835 kernel: audit: type=1327 audit(1707434447.186:855): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:20:47.186000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.210157 kernel: Failed to create system directory fscache Feb 8 23:20:47.210205 kernel: audit: type=1400 audit(1707434447.204:856): avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.210225 kernel: Failed to create system directory fscache Feb 8 23:20:47.210238 kernel: audit: type=1400 audit(1707434447.204:856): avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.212870 kernel: Failed to create system directory fscache Feb 8 23:20:47.212899 kernel: audit: type=1400 audit(1707434447.204:856): avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.215607 kernel: Failed to create system directory fscache Feb 8 23:20:47.215640 kernel: audit: type=1400 audit(1707434447.204:856): avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.216163 kernel: Failed to create system directory fscache Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.220033 kernel: Failed to create system directory fscache Feb 8 23:20:47.220061 kernel: Failed to create system directory fscache Feb 8 23:20:47.220080 kernel: Failed to create system directory fscache Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.221162 kernel: Failed to create system directory fscache Feb 8 23:20:47.221181 kernel: Failed to create system directory fscache Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.222297 kernel: Failed to create system directory fscache Feb 8 23:20:47.222324 kernel: Failed to create system directory fscache Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.223452 kernel: Failed to create system directory fscache Feb 8 23:20:47.223480 kernel: Failed to create system directory fscache Feb 8 23:20:47.204000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.204000 audit[3227]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562988be49c0 a1=4c0fc a2=562986e132b0 a3=5 items=0 ppid=1056 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.204000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:20:47.225873 kernel: FS-Cache: Loaded Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.251163 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.251187 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.251201 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.252228 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.252259 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.253308 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.253330 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.254372 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.254397 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.255971 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.255990 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.256011 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.257025 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.257043 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.258090 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.258131 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.259147 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.259167 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.260180 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.260199 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.261260 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.261279 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.262286 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.262306 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.263313 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.263331 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.264337 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.264358 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.265359 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.265382 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.266900 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.266919 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.266938 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.267954 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.267995 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.268984 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.269006 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.270006 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.270031 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.271042 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.271072 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.272074 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.272103 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.273107 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.273130 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.274138 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.274171 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.275164 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.275193 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.276243 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.276266 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.277291 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.277334 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.278339 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.278386 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.279943 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.279968 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.279991 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.280973 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.281001 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.282015 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.282037 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.283041 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.283062 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.284071 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.284092 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.285106 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.285128 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.286149 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.286182 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.287205 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.287249 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.288258 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.288295 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.289290 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.289321 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.290331 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.290353 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.291373 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.291392 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.292938 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.292961 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.292976 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.293968 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.293990 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.295006 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.295041 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.296043 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.296062 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.297126 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.297146 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.298215 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.298238 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.299254 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.299284 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.300285 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.300305 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.301321 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.301343 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.302386 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.302404 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.304129 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.304166 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.304183 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.305167 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.305190 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.306209 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.306230 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.307241 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.307268 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.308297 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.308342 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.309348 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.309382 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.310916 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.310939 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.310954 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.311949 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.311972 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.312985 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.313010 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.314031 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.314052 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.315191 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.315213 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.241000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.316414 kernel: Failed to create system directory sunrpc Feb 8 23:20:47.325287 kernel: RPC: Registered named UNIX socket transport module. Feb 8 23:20:47.325326 kernel: RPC: Registered udp transport module. Feb 8 23:20:47.325342 kernel: RPC: Registered tcp transport module. Feb 8 23:20:47.325366 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 8 23:20:47.241000 audit[3227]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562988c30ad0 a1=1588c4 a2=562986e132b0 a3=5 items=6 ppid=1056 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.241000 audit: CWD cwd="/" Feb 8 23:20:47.241000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:47.241000 audit: PATH item=1 name=(null) inode=26671 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:47.241000 audit: PATH item=2 name=(null) inode=26671 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:47.241000 audit: PATH item=3 name=(null) inode=26672 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:47.241000 audit: PATH item=4 name=(null) inode=26671 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:47.241000 audit: PATH item=5 name=(null) inode=26673 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:20:47.241000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.350911 kernel: Failed to create system directory nfs Feb 8 23:20:47.350949 kernel: Failed to create system directory nfs Feb 8 23:20:47.350966 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.352320 kernel: Failed to create system directory nfs Feb 8 23:20:47.352338 kernel: Failed to create system directory nfs Feb 8 23:20:47.352353 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.353261 kernel: Failed to create system directory nfs Feb 8 23:20:47.353281 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.354205 kernel: Failed to create system directory nfs Feb 8 23:20:47.354233 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.355164 kernel: Failed to create system directory nfs Feb 8 23:20:47.355184 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.356109 kernel: Failed to create system directory nfs Feb 8 23:20:47.356129 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.357071 kernel: Failed to create system directory nfs Feb 8 23:20:47.357098 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.358011 kernel: Failed to create system directory nfs Feb 8 23:20:47.358047 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.358951 kernel: Failed to create system directory nfs Feb 8 23:20:47.358976 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.359896 kernel: Failed to create system directory nfs Feb 8 23:20:47.359924 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.361296 kernel: Failed to create system directory nfs Feb 8 23:20:47.361320 kernel: Failed to create system directory nfs Feb 8 23:20:47.361336 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.362233 kernel: Failed to create system directory nfs Feb 8 23:20:47.362254 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.363177 kernel: Failed to create system directory nfs Feb 8 23:20:47.363205 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.364114 kernel: Failed to create system directory nfs Feb 8 23:20:47.364140 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.365059 kernel: Failed to create system directory nfs Feb 8 23:20:47.365086 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.366025 kernel: Failed to create system directory nfs Feb 8 23:20:47.366053 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.366994 kernel: Failed to create system directory nfs Feb 8 23:20:47.367016 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.367963 kernel: Failed to create system directory nfs Feb 8 23:20:47.368007 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.368900 kernel: Failed to create system directory nfs Feb 8 23:20:47.368923 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.370308 kernel: Failed to create system directory nfs Feb 8 23:20:47.370333 kernel: Failed to create system directory nfs Feb 8 23:20:47.370349 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.371263 kernel: Failed to create system directory nfs Feb 8 23:20:47.371283 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.372229 kernel: Failed to create system directory nfs Feb 8 23:20:47.372251 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.373185 kernel: Failed to create system directory nfs Feb 8 23:20:47.373212 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.374133 kernel: Failed to create system directory nfs Feb 8 23:20:47.374154 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.375083 kernel: Failed to create system directory nfs Feb 8 23:20:47.375104 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.376022 kernel: Failed to create system directory nfs Feb 8 23:20:47.376044 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.376961 kernel: Failed to create system directory nfs Feb 8 23:20:47.376982 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.343000 audit[3227]: AVC avc: denied { confidentiality } for pid=3227 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.377909 kernel: Failed to create system directory nfs Feb 8 23:20:47.343000 audit[3227]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562988dd3680 a1=e29dc a2=562986e132b0 a3=5 items=0 ppid=1056 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.343000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:20:47.390884 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.422213 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.422260 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.422290 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.423180 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.423203 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.424134 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.424170 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.425091 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.425122 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.426052 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.426081 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.427001 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.427029 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.427952 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.428010 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.428912 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.428934 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.429875 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.429902 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.431314 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.431334 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.431349 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.432287 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.432308 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.433245 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.433267 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.434195 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.434222 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.435149 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.435170 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.436105 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.436127 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.437070 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.437101 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.438045 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.438066 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.439007 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.439032 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.439972 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.440000 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.440933 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.440955 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.441886 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.441913 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.443034 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.443057 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.444899 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.445025 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.447335 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.447997 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.448035 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.450053 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.450085 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.450099 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.451150 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.451194 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.452212 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.452239 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.453334 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.453368 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.454314 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.454348 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.455311 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.455468 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.456350 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.456379 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.456937 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.457894 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.457949 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.458886 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.458917 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.459882 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.459913 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.461336 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.461366 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.461386 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.462318 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.462346 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.463304 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.463336 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.464291 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.464329 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.465280 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.465311 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.466277 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.466308 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.467273 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.467305 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.468281 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.468323 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.469265 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.469296 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.470252 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.470283 kernel: Failed to create system directory nfs4 Feb 8 23:20:47.411000 audit[3233]: AVC avc: denied { confidentiality } for pid=3233 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.611034 kernel: NFS: Registering the id_resolver key type Feb 8 23:20:47.611276 kernel: Key type id_resolver registered Feb 8 23:20:47.611302 kernel: Key type id_legacy registered Feb 8 23:20:47.411000 audit[3233]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f409885f010 a1=1d3cc4 a2=55dc6430b2b0 a3=5 items=0 ppid=1056 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.411000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.620349 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.620381 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.620414 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.621347 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.621373 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.621885 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.622938 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.622979 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.623997 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.624029 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.624997 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.625026 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.626039 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.626091 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.627072 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.627103 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.628087 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.628133 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.629102 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.629130 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.630114 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.630143 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.631131 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.631160 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.632127 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.632165 kernel: Failed to create system directory rpcgss Feb 8 23:20:47.616000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:20:47.616000 audit[3234]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f550349a010 a1=4f524 a2=564b005c82b0 a3=5 items=0 ppid=1056 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.616000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 8 23:20:47.644002 nfsidmap[3243]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 8 23:20:47.646523 nfsidmap[3246]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 8 23:20:47.653000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:20:47.653000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:20:47.653000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:20:47.653000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:20:47.653000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fd7debf5e0 a2=10 a3=cbe6881e7397cfdd items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.653000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:20:47.653000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:20:47.653000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fd7debf5e0 a2=10 a3=cbe6881e7397cfdd items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.653000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:20:47.653000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:20:47.653000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fd7debf5e0 a2=10 a3=cbe6881e7397cfdd items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.653000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:20:47.852090 kubelet[1428]: E0208 23:20:47.852007 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:47.872047 env[1125]: time="2024-02-08T23:20:47.871989670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25,Namespace:default,Attempt:0,}" Feb 8 23:20:47.960257 systemd-networkd[1019]: cali5ec59c6bf6e: Link UP Feb 8 23:20:47.961985 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:20:47.962037 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 8 23:20:47.962286 systemd-networkd[1019]: cali5ec59c6bf6e: Gained carrier Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.908 [INFO][3249] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.51-k8s-test--pod--1-eth0 default 4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25 1143 0 2024-02-08 23:20:25 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.51 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.51-k8s-test--pod--1-" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.908 [INFO][3249] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.51-k8s-test--pod--1-eth0" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.929 [INFO][3263] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" HandleID="k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Workload="10.0.0.51-k8s-test--pod--1-eth0" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.938 [INFO][3263] ipam_plugin.go 268: Auto assigning IP ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" HandleID="k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Workload="10.0.0.51-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00052d8c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.51", "pod":"test-pod-1", "timestamp":"2024-02-08 23:20:47.929082098 +0000 UTC"}, Hostname:"10.0.0.51", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.938 [INFO][3263] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.938 [INFO][3263] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.938 [INFO][3263] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.51' Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.939 [INFO][3263] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.943 [INFO][3263] ipam.go 372: Looking up existing affinities for host host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.946 [INFO][3263] ipam.go 489: Trying affinity for 192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.947 [INFO][3263] ipam.go 155: Attempting to load block cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.949 [INFO][3263] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.109.192/26 host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.949 [INFO][3263] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.109.192/26 handle="k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.950 [INFO][3263] ipam.go 1682: Creating new handle: k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.953 [INFO][3263] ipam.go 1203: Writing block in order to claim IPs block=192.168.109.192/26 handle="k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.956 [INFO][3263] ipam.go 1216: Successfully claimed IPs: [192.168.109.197/26] block=192.168.109.192/26 handle="k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.956 [INFO][3263] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.109.197/26] handle="k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" host="10.0.0.51" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.956 [INFO][3263] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.956 [INFO][3263] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.109.197/26] IPv6=[] ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" HandleID="k8s-pod-network.1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Workload="10.0.0.51-k8s-test--pod--1-eth0" Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.958 [INFO][3249] k8s.go 385: Populated endpoint ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.51-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25", ResourceVersion:"1143", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:47.971204 env[1125]: 2024-02-08 23:20:47.958 [INFO][3249] k8s.go 386: Calico CNI using IPs: [192.168.109.197/32] ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.51-k8s-test--pod--1-eth0" Feb 8 23:20:47.972122 env[1125]: 2024-02-08 23:20:47.958 [INFO][3249] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.51-k8s-test--pod--1-eth0" Feb 8 23:20:47.972122 env[1125]: 2024-02-08 23:20:47.962 [INFO][3249] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.51-k8s-test--pod--1-eth0" Feb 8 23:20:47.972122 env[1125]: 2024-02-08 23:20:47.962 [INFO][3249] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.51-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.51-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25", ResourceVersion:"1143", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 20, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.51", ContainerID:"1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.109.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"66:8e:30:08:07:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:20:47.972122 env[1125]: 2024-02-08 23:20:47.966 [INFO][3249] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.51-k8s-test--pod--1-eth0" Feb 8 23:20:47.979000 audit[3285]: NETFILTER_CFG table=filter:95 family=2 entries=42 op=nft_register_chain pid=3285 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:20:47.979000 audit[3285]: SYSCALL arch=c000003e syscall=46 success=yes exit=20268 a0=3 a1=7ffd132b71e0 a2=0 a3=7ffd132b71cc items=0 ppid=2190 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:47.979000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:20:47.985628 env[1125]: time="2024-02-08T23:20:47.985526454Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:20:47.985628 env[1125]: time="2024-02-08T23:20:47.985580406Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:20:47.985628 env[1125]: time="2024-02-08T23:20:47.985592029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:20:47.986328 env[1125]: time="2024-02-08T23:20:47.986167273Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a pid=3292 runtime=io.containerd.runc.v2 Feb 8 23:20:47.998549 systemd[1]: Started cri-containerd-1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a.scope. Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit: BPF prog-id=119 op=LOAD Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3292 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663636373439353338653365613637373161636264663931343063 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=3292 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663636373439353338653365613637373161636264663931343063 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit: BPF prog-id=120 op=LOAD Feb 8 23:20:48.012000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c000304380 items=0 ppid=3292 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663636373439353338653365613637373161636264663931343063 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.012000 audit: BPF prog-id=121 op=LOAD Feb 8 23:20:48.012000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0003043c8 items=0 ppid=3292 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663636373439353338653365613637373161636264663931343063 Feb 8 23:20:48.013000 audit: BPF prog-id=121 op=UNLOAD Feb 8 23:20:48.013000 audit: BPF prog-id=120 op=UNLOAD Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.013000 audit: BPF prog-id=122 op=LOAD Feb 8 23:20:48.013000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0003047d8 items=0 ppid=3292 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165663636373439353338653365613637373161636264663931343063 Feb 8 23:20:48.014924 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 8 23:20:48.041104 env[1125]: time="2024-02-08T23:20:48.041054556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4aa8b7e5-dd12-45b8-a1c0-a9c05dd6cb25,Namespace:default,Attempt:0,} returns sandbox id \"1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a\"" Feb 8 23:20:48.042502 env[1125]: time="2024-02-08T23:20:48.042473004Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 8 23:20:48.507110 env[1125]: time="2024-02-08T23:20:48.507053275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:48.508875 env[1125]: time="2024-02-08T23:20:48.508798023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:48.510166 env[1125]: time="2024-02-08T23:20:48.510127312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:48.511640 env[1125]: time="2024-02-08T23:20:48.511612577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:20:48.512193 env[1125]: time="2024-02-08T23:20:48.512162411Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 8 23:20:48.513954 env[1125]: time="2024-02-08T23:20:48.513922389Z" level=info msg="CreateContainer within sandbox \"1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 8 23:20:48.525916 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount983673320.mount: Deactivated successfully. Feb 8 23:20:48.528781 env[1125]: time="2024-02-08T23:20:48.528742884Z" level=info msg="CreateContainer within sandbox \"1ef66749538e3ea6771acbdf9140c10a371b7e421687858ce7a4a25c42e6df0a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"d9e9bd377b25a3570d5e87021f0553f90c8b5be422dd8848e8ec0add82555728\"" Feb 8 23:20:48.529387 env[1125]: time="2024-02-08T23:20:48.529336533Z" level=info msg="StartContainer for \"d9e9bd377b25a3570d5e87021f0553f90c8b5be422dd8848e8ec0add82555728\"" Feb 8 23:20:48.547102 systemd[1]: Started cri-containerd-d9e9bd377b25a3570d5e87021f0553f90c8b5be422dd8848e8ec0add82555728.scope. Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.556000 audit: BPF prog-id=123 op=LOAD Feb 8 23:20:48.556000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.556000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3292 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653962643337376232356133353730643565383730323166303535 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3292 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653962643337376232356133353730643565383730323166303535 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.557000 audit: BPF prog-id=124 op=LOAD Feb 8 23:20:48.557000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c23f0 items=0 ppid=3292 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653962643337376232356133353730643565383730323166303535 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.558000 audit: BPF prog-id=125 op=LOAD Feb 8 23:20:48.558000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c2438 items=0 ppid=3292 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653962643337376232356133353730643565383730323166303535 Feb 8 23:20:48.559000 audit: BPF prog-id=125 op=UNLOAD Feb 8 23:20:48.559000 audit: BPF prog-id=124 op=UNLOAD Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { perfmon } for pid=3333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit[3333]: AVC avc: denied { bpf } for pid=3333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:20:48.559000 audit: BPF prog-id=126 op=LOAD Feb 8 23:20:48.559000 audit[3333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c2848 items=0 ppid=3292 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:20:48.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653962643337376232356133353730643565383730323166303535 Feb 8 23:20:48.574031 env[1125]: time="2024-02-08T23:20:48.573956239Z" level=info msg="StartContainer for \"d9e9bd377b25a3570d5e87021f0553f90c8b5be422dd8848e8ec0add82555728\" returns successfully" Feb 8 23:20:48.852368 kubelet[1428]: E0208 23:20:48.852217 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:49.045079 kubelet[1428]: I0208 23:20:49.045044 1428 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=23.574754687 podCreationTimestamp="2024-02-08 23:20:25 +0000 UTC" firstStartedPulling="2024-02-08 23:20:48.042175798 +0000 UTC m=+63.745092963" lastFinishedPulling="2024-02-08 23:20:48.512428408 +0000 UTC m=+64.215345573" observedRunningTime="2024-02-08 23:20:49.044810692 +0000 UTC m=+64.747727867" watchObservedRunningTime="2024-02-08 23:20:49.045007297 +0000 UTC m=+64.747924462" Feb 8 23:20:49.542139 systemd-networkd[1019]: cali5ec59c6bf6e: Gained IPv6LL Feb 8 23:20:49.852434 kubelet[1428]: E0208 23:20:49.852295 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:50.853177 kubelet[1428]: E0208 23:20:50.853124 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:51.853897 kubelet[1428]: E0208 23:20:51.853824 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:52.854301 kubelet[1428]: E0208 23:20:52.854253 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:20:53.854608 kubelet[1428]: E0208 23:20:53.854572 1428 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"