Feb 9 18:55:29.793556 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 18:55:29.793575 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:55:29.793583 kernel: BIOS-provided physical RAM map: Feb 9 18:55:29.793588 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 18:55:29.793594 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 18:55:29.793599 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 18:55:29.793605 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Feb 9 18:55:29.793611 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Feb 9 18:55:29.793618 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 9 18:55:29.793623 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 18:55:29.793629 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Feb 9 18:55:29.793634 kernel: NX (Execute Disable) protection: active Feb 9 18:55:29.793639 kernel: SMBIOS 2.8 present. Feb 9 18:55:29.793645 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Feb 9 18:55:29.793653 kernel: Hypervisor detected: KVM Feb 9 18:55:29.793659 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 18:55:29.793665 kernel: kvm-clock: cpu 0, msr 2cfaa001, primary cpu clock Feb 9 18:55:29.793670 kernel: kvm-clock: using sched offset of 2142688011 cycles Feb 9 18:55:29.793676 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 18:55:29.793683 kernel: tsc: Detected 2794.750 MHz processor Feb 9 18:55:29.793689 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 18:55:29.793695 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 18:55:29.793701 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Feb 9 18:55:29.793709 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 18:55:29.793715 kernel: Using GB pages for direct mapping Feb 9 18:55:29.793720 kernel: ACPI: Early table checksum verification disabled Feb 9 18:55:29.793726 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Feb 9 18:55:29.793732 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:55:29.793738 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:55:29.793744 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:55:29.793750 kernel: ACPI: FACS 0x000000009CFE0000 000040 Feb 9 18:55:29.793756 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:55:29.793764 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:55:29.793769 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 18:55:29.793775 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Feb 9 18:55:29.793781 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Feb 9 18:55:29.793787 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Feb 9 18:55:29.793793 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Feb 9 18:55:29.793799 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Feb 9 18:55:29.793805 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Feb 9 18:55:29.793815 kernel: No NUMA configuration found Feb 9 18:55:29.793823 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Feb 9 18:55:29.793830 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Feb 9 18:55:29.793839 kernel: Zone ranges: Feb 9 18:55:29.793849 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 18:55:29.793858 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Feb 9 18:55:29.793869 kernel: Normal empty Feb 9 18:55:29.793877 kernel: Movable zone start for each node Feb 9 18:55:29.793884 kernel: Early memory node ranges Feb 9 18:55:29.793890 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 18:55:29.793896 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Feb 9 18:55:29.793903 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Feb 9 18:55:29.793909 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 18:55:29.793915 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 18:55:29.793922 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Feb 9 18:55:29.793929 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 9 18:55:29.793936 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 18:55:29.793942 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 18:55:29.793949 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 18:55:29.793955 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 18:55:29.793961 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 18:55:29.793968 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 18:55:29.793974 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 18:55:29.793981 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 18:55:29.793988 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 18:55:29.793994 kernel: TSC deadline timer available Feb 9 18:55:29.794000 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 9 18:55:29.794007 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 9 18:55:29.794013 kernel: kvm-guest: setup PV sched yield Feb 9 18:55:29.794020 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Feb 9 18:55:29.794026 kernel: Booting paravirtualized kernel on KVM Feb 9 18:55:29.794032 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 18:55:29.794039 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 9 18:55:29.794045 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 9 18:55:29.794053 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 9 18:55:29.794059 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 9 18:55:29.794066 kernel: kvm-guest: setup async PF for cpu 0 Feb 9 18:55:29.794072 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Feb 9 18:55:29.794078 kernel: kvm-guest: PV spinlocks enabled Feb 9 18:55:29.794085 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 18:55:29.794091 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Feb 9 18:55:29.794098 kernel: Policy zone: DMA32 Feb 9 18:55:29.794105 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:55:29.794113 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:55:29.794120 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 18:55:29.794127 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:55:29.794133 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:55:29.794140 kernel: Memory: 2438768K/2571756K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 132728K reserved, 0K cma-reserved) Feb 9 18:55:29.794147 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 18:55:29.794153 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 18:55:29.794159 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 18:55:29.794175 kernel: rcu: Hierarchical RCU implementation. Feb 9 18:55:29.794182 kernel: rcu: RCU event tracing is enabled. Feb 9 18:55:29.794188 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 18:55:29.794204 kernel: Rude variant of Tasks RCU enabled. Feb 9 18:55:29.794210 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:55:29.794216 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:55:29.794223 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 18:55:29.794229 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 9 18:55:29.794236 kernel: random: crng init done Feb 9 18:55:29.794244 kernel: Console: colour VGA+ 80x25 Feb 9 18:55:29.794250 kernel: printk: console [ttyS0] enabled Feb 9 18:55:29.794257 kernel: ACPI: Core revision 20210730 Feb 9 18:55:29.794263 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 18:55:29.794270 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 18:55:29.794276 kernel: x2apic enabled Feb 9 18:55:29.794282 kernel: Switched APIC routing to physical x2apic. Feb 9 18:55:29.794289 kernel: kvm-guest: setup PV IPIs Feb 9 18:55:29.794295 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 18:55:29.794303 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 18:55:29.794309 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 9 18:55:29.794316 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 9 18:55:29.794322 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 9 18:55:29.794328 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 9 18:55:29.794335 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 18:55:29.794341 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 18:55:29.794348 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 18:55:29.794354 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 18:55:29.794366 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 9 18:55:29.794373 kernel: RETBleed: Mitigation: untrained return thunk Feb 9 18:55:29.794380 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 18:55:29.794388 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 18:55:29.794395 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 18:55:29.794401 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 18:55:29.794408 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 18:55:29.794415 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 18:55:29.794422 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 18:55:29.794430 kernel: Freeing SMP alternatives memory: 32K Feb 9 18:55:29.794436 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:55:29.794443 kernel: LSM: Security Framework initializing Feb 9 18:55:29.794450 kernel: SELinux: Initializing. Feb 9 18:55:29.794457 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:55:29.794463 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:55:29.794470 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 9 18:55:29.794479 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 9 18:55:29.794488 kernel: ... version: 0 Feb 9 18:55:29.794497 kernel: ... bit width: 48 Feb 9 18:55:29.794506 kernel: ... generic registers: 6 Feb 9 18:55:29.794513 kernel: ... value mask: 0000ffffffffffff Feb 9 18:55:29.794519 kernel: ... max period: 00007fffffffffff Feb 9 18:55:29.794526 kernel: ... fixed-purpose events: 0 Feb 9 18:55:29.794533 kernel: ... event mask: 000000000000003f Feb 9 18:55:29.794539 kernel: signal: max sigframe size: 1776 Feb 9 18:55:29.794546 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:55:29.794554 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:55:29.794561 kernel: x86: Booting SMP configuration: Feb 9 18:55:29.794568 kernel: .... node #0, CPUs: #1 Feb 9 18:55:29.794574 kernel: kvm-clock: cpu 1, msr 2cfaa041, secondary cpu clock Feb 9 18:55:29.794581 kernel: kvm-guest: setup async PF for cpu 1 Feb 9 18:55:29.794588 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Feb 9 18:55:29.794594 kernel: #2 Feb 9 18:55:29.794601 kernel: kvm-clock: cpu 2, msr 2cfaa081, secondary cpu clock Feb 9 18:55:29.794608 kernel: kvm-guest: setup async PF for cpu 2 Feb 9 18:55:29.794616 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Feb 9 18:55:29.794623 kernel: #3 Feb 9 18:55:29.794629 kernel: kvm-clock: cpu 3, msr 2cfaa0c1, secondary cpu clock Feb 9 18:55:29.794636 kernel: kvm-guest: setup async PF for cpu 3 Feb 9 18:55:29.794642 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Feb 9 18:55:29.794649 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 18:55:29.794656 kernel: smpboot: Max logical packages: 1 Feb 9 18:55:29.794675 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 9 18:55:29.794682 kernel: devtmpfs: initialized Feb 9 18:55:29.794691 kernel: x86/mm: Memory block size: 128MB Feb 9 18:55:29.794698 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:55:29.794705 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 18:55:29.794712 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:55:29.794719 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:55:29.794725 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:55:29.794732 kernel: audit: type=2000 audit(1707504930.050:1): state=initialized audit_enabled=0 res=1 Feb 9 18:55:29.794739 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:55:29.794745 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 18:55:29.794753 kernel: cpuidle: using governor menu Feb 9 18:55:29.794760 kernel: ACPI: bus type PCI registered Feb 9 18:55:29.794766 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:55:29.794773 kernel: dca service started, version 1.12.1 Feb 9 18:55:29.794780 kernel: PCI: Using configuration type 1 for base access Feb 9 18:55:29.794786 kernel: PCI: Using configuration type 1 for extended access Feb 9 18:55:29.794793 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 18:55:29.794800 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:55:29.794807 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:55:29.794815 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:55:29.794821 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:55:29.794828 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:55:29.794835 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:55:29.794841 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:55:29.794848 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:55:29.794854 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:55:29.794861 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 18:55:29.794868 kernel: ACPI: Interpreter enabled Feb 9 18:55:29.794874 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 18:55:29.794882 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 18:55:29.794889 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 18:55:29.794896 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 18:55:29.794902 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 18:55:29.795022 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 18:55:29.795034 kernel: acpiphp: Slot [3] registered Feb 9 18:55:29.795041 kernel: acpiphp: Slot [4] registered Feb 9 18:55:29.795047 kernel: acpiphp: Slot [5] registered Feb 9 18:55:29.795056 kernel: acpiphp: Slot [6] registered Feb 9 18:55:29.795062 kernel: acpiphp: Slot [7] registered Feb 9 18:55:29.795069 kernel: acpiphp: Slot [8] registered Feb 9 18:55:29.795076 kernel: acpiphp: Slot [9] registered Feb 9 18:55:29.795082 kernel: acpiphp: Slot [10] registered Feb 9 18:55:29.795089 kernel: acpiphp: Slot [11] registered Feb 9 18:55:29.795095 kernel: acpiphp: Slot [12] registered Feb 9 18:55:29.795102 kernel: acpiphp: Slot [13] registered Feb 9 18:55:29.795111 kernel: acpiphp: Slot [14] registered Feb 9 18:55:29.795122 kernel: acpiphp: Slot [15] registered Feb 9 18:55:29.795131 kernel: acpiphp: Slot [16] registered Feb 9 18:55:29.795140 kernel: acpiphp: Slot [17] registered Feb 9 18:55:29.795147 kernel: acpiphp: Slot [18] registered Feb 9 18:55:29.795154 kernel: acpiphp: Slot [19] registered Feb 9 18:55:29.795160 kernel: acpiphp: Slot [20] registered Feb 9 18:55:29.795176 kernel: acpiphp: Slot [21] registered Feb 9 18:55:29.795183 kernel: acpiphp: Slot [22] registered Feb 9 18:55:29.795189 kernel: acpiphp: Slot [23] registered Feb 9 18:55:29.795206 kernel: acpiphp: Slot [24] registered Feb 9 18:55:29.795213 kernel: acpiphp: Slot [25] registered Feb 9 18:55:29.795220 kernel: acpiphp: Slot [26] registered Feb 9 18:55:29.795226 kernel: acpiphp: Slot [27] registered Feb 9 18:55:29.795233 kernel: acpiphp: Slot [28] registered Feb 9 18:55:29.795240 kernel: acpiphp: Slot [29] registered Feb 9 18:55:29.795246 kernel: acpiphp: Slot [30] registered Feb 9 18:55:29.795253 kernel: acpiphp: Slot [31] registered Feb 9 18:55:29.795259 kernel: PCI host bridge to bus 0000:00 Feb 9 18:55:29.795349 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 18:55:29.795414 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 18:55:29.795475 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 18:55:29.795536 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 9 18:55:29.795596 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 9 18:55:29.795656 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 18:55:29.795738 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 18:55:29.795840 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 18:55:29.795954 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 18:55:29.796033 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 9 18:55:29.796101 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 18:55:29.796178 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 18:55:29.796260 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 18:55:29.796328 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 18:55:29.796407 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 18:55:29.796479 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 9 18:55:29.796549 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 9 18:55:29.796622 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 9 18:55:29.796691 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Feb 9 18:55:29.796756 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Feb 9 18:55:29.796841 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Feb 9 18:55:29.796926 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 18:55:29.797006 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 18:55:29.797075 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 18:55:29.797151 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Feb 9 18:55:29.797239 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Feb 9 18:55:29.797314 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 18:55:29.797385 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 18:55:29.797453 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Feb 9 18:55:29.797519 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Feb 9 18:55:29.797593 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 9 18:55:29.797666 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 9 18:55:29.797736 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Feb 9 18:55:29.797811 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Feb 9 18:55:29.797882 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Feb 9 18:55:29.797892 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 18:55:29.797899 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 18:55:29.797906 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 18:55:29.797912 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 18:55:29.797919 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 18:55:29.797926 kernel: iommu: Default domain type: Translated Feb 9 18:55:29.797933 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 18:55:29.797998 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 18:55:29.798068 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 18:55:29.798135 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 18:55:29.798144 kernel: vgaarb: loaded Feb 9 18:55:29.798151 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:55:29.798158 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 18:55:29.798173 kernel: PTP clock support registered Feb 9 18:55:29.798179 kernel: PCI: Using ACPI for IRQ routing Feb 9 18:55:29.798186 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 18:55:29.798203 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 18:55:29.798210 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Feb 9 18:55:29.798217 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 18:55:29.798224 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 18:55:29.798230 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 18:55:29.798237 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:55:29.798244 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:55:29.798251 kernel: pnp: PnP ACPI init Feb 9 18:55:29.798338 kernel: pnp 00:02: [dma 2] Feb 9 18:55:29.798351 kernel: pnp: PnP ACPI: found 6 devices Feb 9 18:55:29.798358 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 18:55:29.798365 kernel: NET: Registered PF_INET protocol family Feb 9 18:55:29.798372 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 18:55:29.798379 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 18:55:29.798386 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:55:29.798393 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:55:29.798401 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 18:55:29.798412 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 18:55:29.798419 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:55:29.798426 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:55:29.798433 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:55:29.798439 kernel: NET: Registered PF_XDP protocol family Feb 9 18:55:29.798505 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 18:55:29.798565 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 18:55:29.798624 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 18:55:29.798684 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 9 18:55:29.798746 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 9 18:55:29.798815 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 18:55:29.798890 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 18:55:29.798960 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 18:55:29.798969 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:55:29.798976 kernel: Initialise system trusted keyrings Feb 9 18:55:29.798983 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 18:55:29.798989 kernel: Key type asymmetric registered Feb 9 18:55:29.798998 kernel: Asymmetric key parser 'x509' registered Feb 9 18:55:29.799005 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:55:29.799013 kernel: io scheduler mq-deadline registered Feb 9 18:55:29.799022 kernel: io scheduler kyber registered Feb 9 18:55:29.799029 kernel: io scheduler bfq registered Feb 9 18:55:29.799036 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 18:55:29.799043 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 18:55:29.799050 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 18:55:29.799057 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 18:55:29.799065 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:55:29.799072 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 18:55:29.799079 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 18:55:29.799085 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 18:55:29.799092 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 18:55:29.799099 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 18:55:29.799180 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 9 18:55:29.799256 kernel: rtc_cmos 00:05: registered as rtc0 Feb 9 18:55:29.799325 kernel: rtc_cmos 00:05: setting system clock to 2024-02-09T18:55:29 UTC (1707504929) Feb 9 18:55:29.799388 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 9 18:55:29.799397 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:55:29.799403 kernel: Segment Routing with IPv6 Feb 9 18:55:29.799410 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:55:29.799417 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:55:29.799424 kernel: Key type dns_resolver registered Feb 9 18:55:29.799430 kernel: IPI shorthand broadcast: enabled Feb 9 18:55:29.799437 kernel: sched_clock: Marking stable (397251912, 90968185)->(493671253, -5451156) Feb 9 18:55:29.799446 kernel: registered taskstats version 1 Feb 9 18:55:29.799453 kernel: Loading compiled-in X.509 certificates Feb 9 18:55:29.799460 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 18:55:29.799466 kernel: Key type .fscrypt registered Feb 9 18:55:29.799473 kernel: Key type fscrypt-provisioning registered Feb 9 18:55:29.799480 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:55:29.799487 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:55:29.799494 kernel: ima: No architecture policies found Feb 9 18:55:29.799500 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 18:55:29.799509 kernel: Write protecting the kernel read-only data: 28672k Feb 9 18:55:29.799516 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 18:55:29.799523 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 18:55:29.799530 kernel: Run /init as init process Feb 9 18:55:29.799536 kernel: with arguments: Feb 9 18:55:29.799543 kernel: /init Feb 9 18:55:29.799550 kernel: with environment: Feb 9 18:55:29.799565 kernel: HOME=/ Feb 9 18:55:29.799573 kernel: TERM=linux Feb 9 18:55:29.799581 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:55:29.799590 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:55:29.799600 systemd[1]: Detected virtualization kvm. Feb 9 18:55:29.799607 systemd[1]: Detected architecture x86-64. Feb 9 18:55:29.799615 systemd[1]: Running in initrd. Feb 9 18:55:29.799622 systemd[1]: No hostname configured, using default hostname. Feb 9 18:55:29.799629 systemd[1]: Hostname set to . Feb 9 18:55:29.799638 systemd[1]: Initializing machine ID from VM UUID. Feb 9 18:55:29.799646 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:55:29.799654 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:55:29.799664 systemd[1]: Reached target cryptsetup.target. Feb 9 18:55:29.799672 systemd[1]: Reached target paths.target. Feb 9 18:55:29.799679 systemd[1]: Reached target slices.target. Feb 9 18:55:29.799687 systemd[1]: Reached target swap.target. Feb 9 18:55:29.799694 systemd[1]: Reached target timers.target. Feb 9 18:55:29.799703 systemd[1]: Listening on iscsid.socket. Feb 9 18:55:29.799711 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:55:29.799718 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:55:29.799726 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:55:29.799734 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:55:29.799741 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:55:29.799749 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:55:29.799756 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:55:29.799765 systemd[1]: Reached target sockets.target. Feb 9 18:55:29.799772 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:55:29.799780 systemd[1]: Finished network-cleanup.service. Feb 9 18:55:29.799788 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:55:29.799795 systemd[1]: Starting systemd-journald.service... Feb 9 18:55:29.799803 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:55:29.799812 systemd[1]: Starting systemd-resolved.service... Feb 9 18:55:29.799820 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:55:29.799828 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:55:29.799835 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:55:29.799846 systemd-journald[198]: Journal started Feb 9 18:55:29.799886 systemd-journald[198]: Runtime Journal (/run/log/journal/cdabbc0f6ae44d258d0b15cd56b065b7) is 6.0M, max 48.5M, 42.5M free. Feb 9 18:55:29.788494 systemd-modules-load[199]: Inserted module 'overlay' Feb 9 18:55:29.819304 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:55:29.819328 kernel: Bridge firewalling registered Feb 9 18:55:29.799001 systemd-resolved[200]: Positive Trust Anchors: Feb 9 18:55:29.822959 systemd[1]: Started systemd-journald.service. Feb 9 18:55:29.822980 kernel: audit: type=1130 audit(1707504929.819:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.799010 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:55:29.826480 kernel: audit: type=1130 audit(1707504929.822:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.826512 kernel: audit: type=1130 audit(1707504929.826:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.799037 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:55:29.832914 kernel: SCSI subsystem initialized Feb 9 18:55:29.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.801126 systemd-resolved[200]: Defaulting to hostname 'linux'. Feb 9 18:55:29.841636 kernel: audit: type=1130 audit(1707504929.832:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.810541 systemd-modules-load[199]: Inserted module 'br_netfilter' Feb 9 18:55:29.845421 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:55:29.845435 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:55:29.845444 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:55:29.823139 systemd[1]: Started systemd-resolved.service. Feb 9 18:55:29.826684 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:55:29.833078 systemd[1]: Reached target nss-lookup.target. Feb 9 18:55:29.842406 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:55:29.845763 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:55:29.851167 systemd-modules-load[199]: Inserted module 'dm_multipath' Feb 9 18:55:29.857656 kernel: audit: type=1130 audit(1707504929.851:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.857674 kernel: audit: type=1130 audit(1707504929.854:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.851222 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:55:29.852316 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:55:29.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.855273 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:55:29.862597 kernel: audit: type=1130 audit(1707504929.858:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.858361 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:55:29.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.861622 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:55:29.866244 kernel: audit: type=1130 audit(1707504929.863:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.862743 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:55:29.870028 dracut-cmdline[222]: dracut-dracut-053 Feb 9 18:55:29.872001 dracut-cmdline[222]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 18:55:29.923215 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:55:29.933215 kernel: iscsi: registered transport (tcp) Feb 9 18:55:29.957217 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:55:29.957238 kernel: QLogic iSCSI HBA Driver Feb 9 18:55:29.984058 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:55:29.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:29.997188 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:55:29.999309 kernel: audit: type=1130 audit(1707504929.996:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:30.042212 kernel: raid6: avx2x4 gen() 31086 MB/s Feb 9 18:55:30.067213 kernel: raid6: avx2x4 xor() 8578 MB/s Feb 9 18:55:30.084210 kernel: raid6: avx2x2 gen() 32750 MB/s Feb 9 18:55:30.101212 kernel: raid6: avx2x2 xor() 19312 MB/s Feb 9 18:55:30.120210 kernel: raid6: avx2x1 gen() 26743 MB/s Feb 9 18:55:30.137213 kernel: raid6: avx2x1 xor() 15412 MB/s Feb 9 18:55:30.154212 kernel: raid6: sse2x4 gen() 14743 MB/s Feb 9 18:55:30.199209 kernel: raid6: sse2x4 xor() 7816 MB/s Feb 9 18:55:30.216208 kernel: raid6: sse2x2 gen() 16523 MB/s Feb 9 18:55:30.233209 kernel: raid6: sse2x2 xor() 9887 MB/s Feb 9 18:55:30.250210 kernel: raid6: sse2x1 gen() 12410 MB/s Feb 9 18:55:30.267630 kernel: raid6: sse2x1 xor() 7825 MB/s Feb 9 18:55:30.267641 kernel: raid6: using algorithm avx2x2 gen() 32750 MB/s Feb 9 18:55:30.267649 kernel: raid6: .... xor() 19312 MB/s, rmw enabled Feb 9 18:55:30.267658 kernel: raid6: using avx2x2 recovery algorithm Feb 9 18:55:30.279212 kernel: xor: automatically using best checksumming function avx Feb 9 18:55:30.366215 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 18:55:30.374659 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:55:30.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:30.375000 audit: BPF prog-id=7 op=LOAD Feb 9 18:55:30.375000 audit: BPF prog-id=8 op=LOAD Feb 9 18:55:30.376187 systemd[1]: Starting systemd-udevd.service... Feb 9 18:55:30.388399 systemd-udevd[401]: Using default interface naming scheme 'v252'. Feb 9 18:55:30.392869 systemd[1]: Started systemd-udevd.service. Feb 9 18:55:30.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:30.393738 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:55:30.403568 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Feb 9 18:55:30.427953 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:55:30.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:30.429129 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:55:30.462447 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:55:30.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:30.487332 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 18:55:30.493220 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:55:30.497502 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 18:55:30.497523 kernel: GPT:9289727 != 19775487 Feb 9 18:55:30.497533 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 18:55:30.497541 kernel: GPT:9289727 != 19775487 Feb 9 18:55:30.498342 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 18:55:30.498361 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:55:30.511216 kernel: libata version 3.00 loaded. Feb 9 18:55:30.514205 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 18:55:30.514225 kernel: AES CTR mode by8 optimization enabled Feb 9 18:55:30.517210 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 18:55:30.522841 kernel: scsi host0: ata_piix Feb 9 18:55:30.528164 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:55:30.548767 kernel: scsi host1: ata_piix Feb 9 18:55:30.548894 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 9 18:55:30.548908 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 9 18:55:30.548916 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (452) Feb 9 18:55:30.549481 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:55:30.554979 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:55:30.559034 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:55:30.565290 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:55:30.566184 systemd[1]: Starting disk-uuid.service... Feb 9 18:55:30.573522 disk-uuid[517]: Primary Header is updated. Feb 9 18:55:30.573522 disk-uuid[517]: Secondary Entries is updated. Feb 9 18:55:30.573522 disk-uuid[517]: Secondary Header is updated. Feb 9 18:55:30.576221 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:55:30.579205 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:55:30.582210 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:55:30.689913 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 9 18:55:30.689964 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 9 18:55:30.719222 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 9 18:55:30.719397 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 18:55:30.736217 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 9 18:55:31.607680 disk-uuid[518]: The operation has completed successfully. Feb 9 18:55:31.608545 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 18:55:31.626426 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:55:31.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.626497 systemd[1]: Finished disk-uuid.service. Feb 9 18:55:31.633397 systemd[1]: Starting verity-setup.service... Feb 9 18:55:31.643210 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 9 18:55:31.658311 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:55:31.659904 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:55:31.661306 systemd[1]: Finished verity-setup.service. Feb 9 18:55:31.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.714948 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:55:31.715907 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:55:31.715504 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:55:31.716947 systemd[1]: Starting ignition-setup.service... Feb 9 18:55:31.717895 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:55:31.726500 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 18:55:31.726537 kernel: BTRFS info (device vda6): using free space tree Feb 9 18:55:31.726546 kernel: BTRFS info (device vda6): has skinny extents Feb 9 18:55:31.732684 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:55:31.762889 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:55:31.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.764000 audit: BPF prog-id=9 op=LOAD Feb 9 18:55:31.764678 systemd[1]: Starting systemd-networkd.service... Feb 9 18:55:31.784098 systemd-networkd[704]: lo: Link UP Feb 9 18:55:31.784106 systemd-networkd[704]: lo: Gained carrier Feb 9 18:55:31.786984 systemd-networkd[704]: Enumeration completed Feb 9 18:55:31.787409 systemd[1]: Started systemd-networkd.service. Feb 9 18:55:31.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.788032 systemd[1]: Reached target network.target. Feb 9 18:55:31.790106 systemd[1]: Starting iscsiuio.service... Feb 9 18:55:31.791147 systemd-networkd[704]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:55:31.792720 systemd-networkd[704]: eth0: Link UP Feb 9 18:55:31.792725 systemd-networkd[704]: eth0: Gained carrier Feb 9 18:55:31.793724 systemd[1]: Started iscsiuio.service. Feb 9 18:55:31.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.794838 systemd[1]: Starting iscsid.service... Feb 9 18:55:31.797203 iscsid[709]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:55:31.797203 iscsid[709]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 18:55:31.797203 iscsid[709]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:55:31.797203 iscsid[709]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:55:31.797203 iscsid[709]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:55:31.797203 iscsid[709]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:55:31.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.798313 systemd[1]: Started iscsid.service. Feb 9 18:55:31.802405 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:55:31.811249 systemd-networkd[704]: eth0: DHCPv4 address 10.0.0.90/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 18:55:31.814633 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:55:31.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.815931 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:55:31.817361 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:55:31.818981 systemd[1]: Reached target remote-fs.target. Feb 9 18:55:31.820133 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:55:31.826354 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:55:31.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.833432 systemd[1]: Finished ignition-setup.service. Feb 9 18:55:31.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.834387 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:55:31.863891 ignition[724]: Ignition 2.14.0 Feb 9 18:55:31.863900 ignition[724]: Stage: fetch-offline Feb 9 18:55:31.863942 ignition[724]: no configs at "/usr/lib/ignition/base.d" Feb 9 18:55:31.863949 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:55:31.864030 ignition[724]: parsed url from cmdline: "" Feb 9 18:55:31.864033 ignition[724]: no config URL provided Feb 9 18:55:31.864036 ignition[724]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:55:31.864042 ignition[724]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:55:31.864062 ignition[724]: op(1): [started] loading QEMU firmware config module Feb 9 18:55:31.864066 ignition[724]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 18:55:31.868675 ignition[724]: op(1): [finished] loading QEMU firmware config module Feb 9 18:55:31.879847 ignition[724]: parsing config with SHA512: df3716cc7bee55d98d0f999e63c33643ab6e752648a3e7d4e3acb17fb7be5f1c93101681907eb2873f971cc5540d238b405d60d6efb921fbcd8fdb046771b83f Feb 9 18:55:31.893907 unknown[724]: fetched base config from "system" Feb 9 18:55:31.893922 unknown[724]: fetched user config from "qemu" Feb 9 18:55:31.895276 ignition[724]: fetch-offline: fetch-offline passed Feb 9 18:55:31.895826 ignition[724]: Ignition finished successfully Feb 9 18:55:31.896781 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:55:31.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.897464 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 18:55:31.899032 systemd[1]: Starting ignition-kargs.service... Feb 9 18:55:31.906865 ignition[732]: Ignition 2.14.0 Feb 9 18:55:31.906873 ignition[732]: Stage: kargs Feb 9 18:55:31.906951 ignition[732]: no configs at "/usr/lib/ignition/base.d" Feb 9 18:55:31.906959 ignition[732]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:55:31.907780 ignition[732]: kargs: kargs passed Feb 9 18:55:31.907811 ignition[732]: Ignition finished successfully Feb 9 18:55:31.910663 systemd[1]: Finished ignition-kargs.service. Feb 9 18:55:31.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.911682 systemd[1]: Starting ignition-disks.service... Feb 9 18:55:31.917829 ignition[738]: Ignition 2.14.0 Feb 9 18:55:31.917836 ignition[738]: Stage: disks Feb 9 18:55:31.917915 ignition[738]: no configs at "/usr/lib/ignition/base.d" Feb 9 18:55:31.917922 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:55:31.920601 ignition[738]: disks: disks passed Feb 9 18:55:31.920633 ignition[738]: Ignition finished successfully Feb 9 18:55:31.921801 systemd[1]: Finished ignition-disks.service. Feb 9 18:55:31.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.922160 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:55:31.923012 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:55:31.924046 systemd[1]: Reached target local-fs.target. Feb 9 18:55:31.925029 systemd[1]: Reached target sysinit.target. Feb 9 18:55:31.925943 systemd[1]: Reached target basic.target. Feb 9 18:55:31.927515 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:55:31.935569 systemd-resolved[200]: Detected conflict on linux IN A 10.0.0.90 Feb 9 18:55:31.935582 systemd-resolved[200]: Hostname conflict, changing published hostname from 'linux' to 'linux6'. Feb 9 18:55:31.937400 systemd-fsck[746]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 18:55:31.941644 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:55:31.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.943728 systemd[1]: Mounting sysroot.mount... Feb 9 18:55:31.948852 systemd[1]: Mounted sysroot.mount. Feb 9 18:55:31.949752 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:55:31.949770 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:55:31.951431 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:55:31.952583 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 18:55:31.952612 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:55:31.953480 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:55:31.956257 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:55:31.957629 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:55:31.960695 initrd-setup-root[756]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:55:31.963352 initrd-setup-root[764]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:55:31.966038 initrd-setup-root[772]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:55:31.968887 initrd-setup-root[780]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:55:31.987948 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:55:31.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:31.989673 systemd[1]: Starting ignition-mount.service... Feb 9 18:55:31.991175 systemd[1]: Starting sysroot-boot.service... Feb 9 18:55:31.994302 bash[797]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 18:55:32.001255 ignition[798]: INFO : Ignition 2.14.0 Feb 9 18:55:32.001255 ignition[798]: INFO : Stage: mount Feb 9 18:55:32.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:32.003441 ignition[798]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 18:55:32.003441 ignition[798]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:55:32.003441 ignition[798]: INFO : mount: mount passed Feb 9 18:55:32.003441 ignition[798]: INFO : Ignition finished successfully Feb 9 18:55:32.002837 systemd[1]: Finished ignition-mount.service. Feb 9 18:55:32.011741 systemd[1]: Finished sysroot-boot.service. Feb 9 18:55:32.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:32.200495 systemd-resolved[200]: Detected conflict on linux6 IN A 10.0.0.90 Feb 9 18:55:32.200512 systemd-resolved[200]: Hostname conflict, changing published hostname from 'linux6' to 'linux13'. Feb 9 18:55:32.668297 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:55:32.673221 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (807) Feb 9 18:55:32.675303 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 18:55:32.675339 kernel: BTRFS info (device vda6): using free space tree Feb 9 18:55:32.675354 kernel: BTRFS info (device vda6): has skinny extents Feb 9 18:55:32.678351 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:55:32.679646 systemd[1]: Starting ignition-files.service... Feb 9 18:55:32.692531 ignition[827]: INFO : Ignition 2.14.0 Feb 9 18:55:32.692531 ignition[827]: INFO : Stage: files Feb 9 18:55:32.693759 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 18:55:32.693759 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:55:32.693759 ignition[827]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:55:32.696396 ignition[827]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:55:32.696396 ignition[827]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:55:32.696396 ignition[827]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:55:32.699689 ignition[827]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:55:32.699689 ignition[827]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:55:32.699689 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 18:55:32.699689 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 18:55:32.697069 unknown[827]: wrote ssh authorized keys file for user: core Feb 9 18:55:32.887321 systemd-networkd[704]: eth0: Gained IPv6LL Feb 9 18:55:33.050528 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 18:55:33.184362 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 18:55:33.186465 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 18:55:33.186465 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 18:55:33.186465 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 18:55:33.471387 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 18:55:33.545889 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 18:55:33.547962 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 18:55:33.547962 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:55:33.547962 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 18:55:33.613903 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 18:55:33.855226 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 18:55:33.855226 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:55:33.858600 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:55:33.858600 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 18:55:33.903382 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 18:55:34.467260 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 18:55:34.469398 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:55:34.469398 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:55:34.471883 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:55:34.471883 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:55:34.474342 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:55:34.475576 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:55:34.476827 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:55:34.476827 ignition[827]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:55:34.479183 ignition[827]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(10): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(11): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 18:55:34.480722 ignition[827]: INFO : files: op(11): op(12): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 18:55:34.502719 ignition[827]: INFO : files: op(11): op(12): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 18:55:34.502719 ignition[827]: INFO : files: op(11): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 18:55:34.502719 ignition[827]: INFO : files: op(13): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:55:34.502719 ignition[827]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:55:34.502719 ignition[827]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:55:34.502719 ignition[827]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:55:34.502719 ignition[827]: INFO : files: files passed Feb 9 18:55:34.502719 ignition[827]: INFO : Ignition finished successfully Feb 9 18:55:34.524038 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 9 18:55:34.524066 kernel: audit: type=1130 audit(1707504934.505:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.524077 kernel: audit: type=1130 audit(1707504934.513:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.524092 kernel: audit: type=1130 audit(1707504934.517:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.524101 kernel: audit: type=1131 audit(1707504934.517:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.503949 systemd[1]: Finished ignition-files.service. Feb 9 18:55:34.506576 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:55:34.526259 initrd-setup-root-after-ignition[850]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 18:55:34.509974 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:55:34.528743 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:55:34.510594 systemd[1]: Starting ignition-quench.service... Feb 9 18:55:34.512400 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:55:34.513664 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:55:34.513747 systemd[1]: Finished ignition-quench.service. Feb 9 18:55:34.517627 systemd[1]: Reached target ignition-complete.target. Feb 9 18:55:34.524388 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:55:34.535315 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:55:34.535403 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:55:34.542032 kernel: audit: type=1130 audit(1707504934.536:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.542053 kernel: audit: type=1131 audit(1707504934.536:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.536768 systemd[1]: Reached target initrd-fs.target. Feb 9 18:55:34.542144 systemd[1]: Reached target initrd.target. Feb 9 18:55:34.543259 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:55:34.544107 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:55:34.553348 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:55:34.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.555473 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:55:34.557681 kernel: audit: type=1130 audit(1707504934.554:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.564284 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:55:34.565536 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:55:34.566267 systemd[1]: Stopped target timers.target. Feb 9 18:55:34.567319 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:55:34.571323 kernel: audit: type=1131 audit(1707504934.568:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.567426 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:55:34.568432 systemd[1]: Stopped target initrd.target. Feb 9 18:55:34.571403 systemd[1]: Stopped target basic.target. Feb 9 18:55:34.572473 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:55:34.573537 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:55:34.574603 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:55:34.575784 systemd[1]: Stopped target remote-fs.target. Feb 9 18:55:34.576888 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:55:34.578072 systemd[1]: Stopped target sysinit.target. Feb 9 18:55:34.579146 systemd[1]: Stopped target local-fs.target. Feb 9 18:55:34.580279 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:55:34.581333 systemd[1]: Stopped target swap.target. Feb 9 18:55:34.586293 kernel: audit: type=1131 audit(1707504934.583:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.582310 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:55:34.582404 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:55:34.590538 kernel: audit: type=1131 audit(1707504934.587:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.583472 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:55:34.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.586332 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:55:34.586421 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:55:34.587613 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:55:34.587703 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:55:34.590660 systemd[1]: Stopped target paths.target. Feb 9 18:55:34.591742 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:55:34.595283 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:55:34.596128 systemd[1]: Stopped target slices.target. Feb 9 18:55:34.597182 systemd[1]: Stopped target sockets.target. Feb 9 18:55:34.598466 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:55:34.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.598579 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:55:34.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.599667 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:55:34.599753 systemd[1]: Stopped ignition-files.service. Feb 9 18:55:34.603741 iscsid[709]: iscsid shutting down. Feb 9 18:55:34.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.601822 systemd[1]: Stopping ignition-mount.service... Feb 9 18:55:34.602989 systemd[1]: Stopping iscsid.service... Feb 9 18:55:34.603728 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:55:34.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.603846 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:55:34.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.611348 ignition[867]: INFO : Ignition 2.14.0 Feb 9 18:55:34.611348 ignition[867]: INFO : Stage: umount Feb 9 18:55:34.611348 ignition[867]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 18:55:34.611348 ignition[867]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 18:55:34.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.605237 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:55:34.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.617991 ignition[867]: INFO : umount: umount passed Feb 9 18:55:34.617991 ignition[867]: INFO : Ignition finished successfully Feb 9 18:55:34.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.605901 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:55:34.606026 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:55:34.607172 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:55:34.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.607296 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:55:34.610183 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:55:34.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.610272 systemd[1]: Stopped iscsid.service. Feb 9 18:55:34.611906 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:55:34.611972 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:55:34.613338 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:55:34.613400 systemd[1]: Stopped ignition-mount.service. Feb 9 18:55:34.615077 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:55:34.615106 systemd[1]: Closed iscsid.socket. Feb 9 18:55:34.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.615696 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:55:34.615727 systemd[1]: Stopped ignition-disks.service. Feb 9 18:55:34.616350 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:55:34.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.616377 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:55:34.617386 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:55:34.635000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:55:34.617414 systemd[1]: Stopped ignition-setup.service. Feb 9 18:55:34.618075 systemd[1]: Stopping iscsiuio.service... Feb 9 18:55:34.619865 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 18:55:34.620787 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:55:34.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.620851 systemd[1]: Stopped iscsiuio.service. Feb 9 18:55:34.621574 systemd[1]: Stopped target network.target. Feb 9 18:55:34.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.622675 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:55:34.622699 systemd[1]: Closed iscsiuio.socket. Feb 9 18:55:34.623142 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:55:34.623571 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:55:34.624119 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:55:34.624179 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:55:34.625239 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:55:34.625271 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:55:34.629236 systemd-networkd[704]: eth0: DHCPv6 lease lost Feb 9 18:55:34.648000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:55:34.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.629442 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:55:34.629521 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:55:34.632150 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:55:34.632261 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:55:34.635208 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:55:34.635241 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:55:34.637470 systemd[1]: Stopping network-cleanup.service... Feb 9 18:55:34.638283 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:55:34.638333 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:55:34.639597 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:55:34.639643 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:55:34.640821 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:55:34.640866 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:55:34.642027 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:55:34.644747 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 18:55:34.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.648536 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:55:34.649138 systemd[1]: Stopped network-cleanup.service. Feb 9 18:55:34.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.655762 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:55:34.655867 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:55:34.656256 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:55:34.656284 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:55:34.656442 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:55:34.656463 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:55:34.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:34.656644 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:55:34.656670 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:55:34.656876 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:55:34.656902 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:55:34.657097 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:55:34.657122 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:55:34.662466 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:55:34.662783 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:55:34.662816 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:55:34.666851 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:55:34.666911 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:55:34.667255 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:55:34.667940 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:55:34.683078 systemd[1]: Switching root. Feb 9 18:55:34.702508 systemd-journald[198]: Journal stopped Feb 9 18:55:37.521524 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Feb 9 18:55:37.521572 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:55:37.521585 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:55:37.521602 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:55:37.521616 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:55:37.521632 kernel: SELinux: policy capability open_perms=1 Feb 9 18:55:37.521645 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:55:37.521656 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:55:37.521669 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:55:37.521678 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:55:37.521687 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:55:37.521697 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:55:37.521707 systemd[1]: Successfully loaded SELinux policy in 35.351ms. Feb 9 18:55:37.521724 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.336ms. Feb 9 18:55:37.521736 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:55:37.521746 systemd[1]: Detected virtualization kvm. Feb 9 18:55:37.521756 systemd[1]: Detected architecture x86-64. Feb 9 18:55:37.521766 systemd[1]: Detected first boot. Feb 9 18:55:37.521776 systemd[1]: Initializing machine ID from VM UUID. Feb 9 18:55:37.521786 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:55:37.521796 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:55:37.521807 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:55:37.521818 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:55:37.521829 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:55:37.521840 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:55:37.521849 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:55:37.521861 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:55:37.521874 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:55:37.521884 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:55:37.521895 systemd[1]: Created slice system-getty.slice. Feb 9 18:55:37.521904 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:55:37.521914 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:55:37.521924 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:55:37.521934 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:55:37.521944 systemd[1]: Created slice user.slice. Feb 9 18:55:37.521954 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:55:37.521964 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:55:37.521981 systemd[1]: Set up automount boot.automount. Feb 9 18:55:37.521993 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:55:37.522003 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:55:37.522013 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:55:37.522023 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:55:37.522034 systemd[1]: Reached target integritysetup.target. Feb 9 18:55:37.522044 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:55:37.522054 systemd[1]: Reached target remote-fs.target. Feb 9 18:55:37.522064 systemd[1]: Reached target slices.target. Feb 9 18:55:37.522076 systemd[1]: Reached target swap.target. Feb 9 18:55:37.522086 systemd[1]: Reached target torcx.target. Feb 9 18:55:37.522096 systemd[1]: Reached target veritysetup.target. Feb 9 18:55:37.522105 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:55:37.522116 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:55:37.522129 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:55:37.522143 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:55:37.522154 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:55:37.522164 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:55:37.522174 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:55:37.522186 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:55:37.522206 systemd[1]: Mounting media.mount... Feb 9 18:55:37.522216 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 18:55:37.522227 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:55:37.522237 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:55:37.522247 systemd[1]: Mounting tmp.mount... Feb 9 18:55:37.522260 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:55:37.522280 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:55:37.522295 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:55:37.522311 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:55:37.522325 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:55:37.522336 systemd[1]: Starting modprobe@drm.service... Feb 9 18:55:37.522346 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:55:37.522356 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:55:37.522366 systemd[1]: Starting modprobe@loop.service... Feb 9 18:55:37.522376 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:55:37.522387 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:55:37.522398 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:55:37.522413 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:55:37.522423 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:55:37.522433 systemd[1]: Stopped systemd-journald.service. Feb 9 18:55:37.522443 kernel: fuse: init (API version 7.34) Feb 9 18:55:37.522453 systemd[1]: Starting systemd-journald.service... Feb 9 18:55:37.522462 kernel: loop: module loaded Feb 9 18:55:37.522471 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:55:37.522481 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:55:37.522491 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:55:37.522502 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:55:37.522512 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:55:37.522522 systemd[1]: Stopped verity-setup.service. Feb 9 18:55:37.522532 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 18:55:37.522542 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:55:37.522552 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:55:37.522562 systemd[1]: Mounted media.mount. Feb 9 18:55:37.522571 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:55:37.522581 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:55:37.522595 systemd-journald[973]: Journal started Feb 9 18:55:37.522630 systemd-journald[973]: Runtime Journal (/run/log/journal/cdabbc0f6ae44d258d0b15cd56b065b7) is 6.0M, max 48.5M, 42.5M free. Feb 9 18:55:34.756000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:55:35.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:55:35.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:55:35.358000 audit: BPF prog-id=10 op=LOAD Feb 9 18:55:35.358000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:55:35.358000 audit: BPF prog-id=11 op=LOAD Feb 9 18:55:35.358000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:55:35.391000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:55:35.391000 audit[900]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:35.391000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:55:35.392000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:55:35.392000 audit[900]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:35.392000 audit: CWD cwd="/" Feb 9 18:55:35.392000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:35.392000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:35.392000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:55:37.422000 audit: BPF prog-id=12 op=LOAD Feb 9 18:55:37.422000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:55:37.422000 audit: BPF prog-id=13 op=LOAD Feb 9 18:55:37.422000 audit: BPF prog-id=14 op=LOAD Feb 9 18:55:37.422000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:55:37.422000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:55:37.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.438000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:55:37.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.501000 audit: BPF prog-id=15 op=LOAD Feb 9 18:55:37.501000 audit: BPF prog-id=16 op=LOAD Feb 9 18:55:37.501000 audit: BPF prog-id=17 op=LOAD Feb 9 18:55:37.501000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:55:37.501000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:55:37.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.520000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:55:37.520000 audit[973]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdfbb74830 a2=4000 a3=7ffdfbb748cc items=0 ppid=1 pid=973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:37.520000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:55:37.420836 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:55:35.389949 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:55:37.420846 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 18:55:35.390150 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:55:37.423289 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:55:35.390167 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:55:35.390212 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:55:35.390221 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:55:37.524206 systemd[1]: Started systemd-journald.service. Feb 9 18:55:35.390249 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:55:35.390260 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:55:35.390442 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:55:35.390473 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:55:37.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:35.390484 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:55:35.390841 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:55:35.390877 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:55:35.390895 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:55:37.524749 systemd[1]: Mounted tmp.mount. Feb 9 18:55:35.390908 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:55:35.390926 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:55:35.390938 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:55:37.171322 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:37Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:55:37.171558 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:37Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:55:37.171641 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:37Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:55:37.171783 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:37Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:55:37.171829 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:37Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:55:37.171890 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2024-02-09T18:55:37Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:55:37.525584 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:55:37.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.526316 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:55:37.526498 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:55:37.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.527246 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:55:37.527418 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:55:37.528267 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:55:37.528410 systemd[1]: Finished modprobe@drm.service. Feb 9 18:55:37.529126 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:55:37.529275 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:55:37.530105 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:55:37.530402 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:55:37.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.531238 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:55:37.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.531978 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:55:37.532256 systemd[1]: Finished modprobe@loop.service. Feb 9 18:55:37.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.533033 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:55:37.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.533884 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:55:37.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.534836 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:55:37.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.535849 systemd[1]: Reached target network-pre.target. Feb 9 18:55:37.537781 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:55:37.539563 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:55:37.540210 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:55:37.541465 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:55:37.542819 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:55:37.543646 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:55:37.544514 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:55:37.545153 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:55:37.546062 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:55:37.547538 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:55:37.548868 systemd-journald[973]: Time spent on flushing to /var/log/journal/cdabbc0f6ae44d258d0b15cd56b065b7 is 80.891ms for 1104 entries. Feb 9 18:55:37.548868 systemd-journald[973]: System Journal (/var/log/journal/cdabbc0f6ae44d258d0b15cd56b065b7) is 8.0M, max 195.6M, 187.6M free. Feb 9 18:55:37.643356 systemd-journald[973]: Received client request to flush runtime journal. Feb 9 18:55:37.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.550707 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:55:37.551504 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:55:37.638702 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:55:37.640617 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:55:37.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.648113 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:55:37.674539 udevadm[1005]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 18:55:37.677737 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:55:37.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.679136 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:55:37.680048 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:55:37.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:37.684610 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:55:37.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.389375 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:55:38.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.390000 audit: BPF prog-id=18 op=LOAD Feb 9 18:55:38.390000 audit: BPF prog-id=19 op=LOAD Feb 9 18:55:38.390000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:55:38.390000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:55:38.391620 systemd[1]: Starting systemd-udevd.service... Feb 9 18:55:38.411634 systemd-udevd[1007]: Using default interface naming scheme 'v252'. Feb 9 18:55:38.425724 systemd[1]: Started systemd-udevd.service. Feb 9 18:55:38.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.427000 audit: BPF prog-id=20 op=LOAD Feb 9 18:55:38.429283 systemd[1]: Starting systemd-networkd.service... Feb 9 18:55:38.434000 audit: BPF prog-id=21 op=LOAD Feb 9 18:55:38.434000 audit: BPF prog-id=22 op=LOAD Feb 9 18:55:38.434000 audit: BPF prog-id=23 op=LOAD Feb 9 18:55:38.435654 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:55:38.465787 systemd[1]: Started systemd-userdbd.service. Feb 9 18:55:38.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.469142 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 18:55:38.502217 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 18:55:38.502272 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:55:38.504936 systemd-networkd[1014]: lo: Link UP Feb 9 18:55:38.504954 systemd-networkd[1014]: lo: Gained carrier Feb 9 18:55:38.505669 systemd-networkd[1014]: Enumeration completed Feb 9 18:55:38.505769 systemd[1]: Started systemd-networkd.service. Feb 9 18:55:38.505996 systemd-networkd[1014]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:55:38.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.507186 systemd-networkd[1014]: eth0: Link UP Feb 9 18:55:38.507379 systemd-networkd[1014]: eth0: Gained carrier Feb 9 18:55:38.508213 kernel: ACPI: button: Power Button [PWRF] Feb 9 18:55:38.523335 systemd-networkd[1014]: eth0: DHCPv4 address 10.0.0.90/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 18:55:38.518000 audit[1016]: AVC avc: denied { confidentiality } for pid=1016 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 18:55:38.518000 audit[1016]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5643584d2300 a1=32194 a2=7fec082c3bc5 a3=5 items=108 ppid=1007 pid=1016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:38.518000 audit: CWD cwd="/" Feb 9 18:55:38.518000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=1 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=2 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=3 name=(null) inode=16444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=4 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=5 name=(null) inode=16445 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=6 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=7 name=(null) inode=16446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=8 name=(null) inode=16446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=9 name=(null) inode=16447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=10 name=(null) inode=16446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=11 name=(null) inode=16448 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=12 name=(null) inode=16446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=13 name=(null) inode=16449 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=14 name=(null) inode=16446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=15 name=(null) inode=16450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=16 name=(null) inode=16446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=17 name=(null) inode=16451 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=18 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=19 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=20 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=21 name=(null) inode=16453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=22 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=23 name=(null) inode=16454 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=24 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=25 name=(null) inode=16455 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=26 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=27 name=(null) inode=16456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=28 name=(null) inode=16452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=29 name=(null) inode=16457 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=30 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=31 name=(null) inode=16458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=32 name=(null) inode=16458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=33 name=(null) inode=16459 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=34 name=(null) inode=16458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=35 name=(null) inode=16460 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=36 name=(null) inode=16458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=37 name=(null) inode=16461 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=38 name=(null) inode=16458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=39 name=(null) inode=16462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=40 name=(null) inode=16458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=41 name=(null) inode=16463 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=42 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=43 name=(null) inode=16464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=44 name=(null) inode=16464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=45 name=(null) inode=16465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=46 name=(null) inode=16464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=47 name=(null) inode=16466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=48 name=(null) inode=16464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=49 name=(null) inode=16467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=50 name=(null) inode=16464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=51 name=(null) inode=16468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=52 name=(null) inode=16464 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=53 name=(null) inode=16469 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=55 name=(null) inode=16470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=56 name=(null) inode=16470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=57 name=(null) inode=16471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=58 name=(null) inode=16470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=59 name=(null) inode=16472 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=60 name=(null) inode=16470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=61 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=62 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=63 name=(null) inode=16474 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=64 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=65 name=(null) inode=16475 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=66 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=67 name=(null) inode=16476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=68 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=69 name=(null) inode=16477 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=70 name=(null) inode=16473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=71 name=(null) inode=16478 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=72 name=(null) inode=16470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=73 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=74 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=75 name=(null) inode=16480 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=76 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=77 name=(null) inode=16481 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=78 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=79 name=(null) inode=16482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=80 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=81 name=(null) inode=16483 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=82 name=(null) inode=16479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=83 name=(null) inode=16484 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=84 name=(null) inode=16470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=85 name=(null) inode=16485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=86 name=(null) inode=16485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=87 name=(null) inode=16486 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=88 name=(null) inode=16485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=89 name=(null) inode=16487 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=90 name=(null) inode=16485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=91 name=(null) inode=16488 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=92 name=(null) inode=16485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=93 name=(null) inode=16489 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=94 name=(null) inode=16485 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=95 name=(null) inode=16490 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=96 name=(null) inode=16470 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=97 name=(null) inode=16491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=98 name=(null) inode=16491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=99 name=(null) inode=16492 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=100 name=(null) inode=16491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=101 name=(null) inode=16493 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=102 name=(null) inode=16491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=103 name=(null) inode=16494 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=104 name=(null) inode=16491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=105 name=(null) inode=16495 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=106 name=(null) inode=16491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PATH item=107 name=(null) inode=16496 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:55:38.518000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:55:38.531237 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 9 18:55:38.556223 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 18:55:38.559209 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 18:55:38.604733 kernel: kvm: Nested Virtualization enabled Feb 9 18:55:38.604898 kernel: SVM: kvm: Nested Paging enabled Feb 9 18:55:38.604938 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 9 18:55:38.604986 kernel: SVM: Virtual GIF supported Feb 9 18:55:38.623211 kernel: EDAC MC: Ver: 3.0.0 Feb 9 18:55:38.639504 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:55:38.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.641262 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:55:38.647826 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:55:38.675898 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:55:38.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.676898 systemd[1]: Reached target cryptsetup.target. Feb 9 18:55:38.678558 systemd[1]: Starting lvm2-activation.service... Feb 9 18:55:38.681373 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:55:38.707928 systemd[1]: Finished lvm2-activation.service. Feb 9 18:55:38.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.708736 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:55:38.709372 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:55:38.709394 systemd[1]: Reached target local-fs.target. Feb 9 18:55:38.709979 systemd[1]: Reached target machines.target. Feb 9 18:55:38.711722 systemd[1]: Starting ldconfig.service... Feb 9 18:55:38.712540 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:55:38.712577 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:55:38.713388 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:55:38.714880 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:55:38.716971 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:55:38.717807 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:55:38.717841 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:55:38.718566 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:55:38.719501 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) Feb 9 18:55:38.720444 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:55:38.732354 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:55:38.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.735435 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:55:38.737348 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:55:38.741726 systemd-tmpfiles[1048]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:55:38.754212 systemd-fsck[1054]: fsck.fat 4.2 (2021-01-31) Feb 9 18:55:38.754212 systemd-fsck[1054]: /dev/vda1: 789 files, 115339/258078 clusters Feb 9 18:55:38.754573 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:55:38.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.757484 systemd[1]: Mounting boot.mount... Feb 9 18:55:38.772354 systemd[1]: Mounted boot.mount. Feb 9 18:55:38.987170 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:55:38.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:38.993579 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:55:38.994186 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:55:38.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:39.039738 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:55:39.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:39.103540 systemd[1]: Starting audit-rules.service... Feb 9 18:55:39.106045 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:55:39.110000 audit: BPF prog-id=24 op=LOAD Feb 9 18:55:39.108614 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:55:39.112125 systemd[1]: Starting systemd-resolved.service... Feb 9 18:55:39.113000 audit: BPF prog-id=25 op=LOAD Feb 9 18:55:39.116348 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:55:39.117000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:55:39.117000 audit[1075]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc4ee6e300 a2=420 a3=0 items=0 ppid=1057 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:39.117000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:55:39.117850 augenrules[1075]: No rules Feb 9 18:55:39.118288 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:55:39.119722 systemd[1]: Finished audit-rules.service. Feb 9 18:55:39.120899 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:55:39.126113 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:55:39.127494 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:55:39.142685 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:55:39.146554 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:55:39.149321 systemd[1]: Finished ldconfig.service. Feb 9 18:55:39.151450 systemd[1]: Starting systemd-update-done.service... Feb 9 18:55:39.159459 systemd[1]: Finished systemd-update-done.service. Feb 9 18:55:39.161602 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:55:39.162439 systemd[1]: Reached target time-set.target. Feb 9 18:55:40.125080 systemd-timesyncd[1076]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 18:55:40.125130 systemd-timesyncd[1076]: Initial clock synchronization to Fri 2024-02-09 18:55:40.125022 UTC. Feb 9 18:55:40.136428 systemd-resolved[1072]: Positive Trust Anchors: Feb 9 18:55:40.136439 systemd-resolved[1072]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:55:40.136466 systemd-resolved[1072]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:55:40.143039 systemd-resolved[1072]: Defaulting to hostname 'linux'. Feb 9 18:55:40.144407 systemd[1]: Started systemd-resolved.service. Feb 9 18:55:40.145163 systemd[1]: Reached target network.target. Feb 9 18:55:40.145804 systemd[1]: Reached target nss-lookup.target. Feb 9 18:55:40.146490 systemd[1]: Reached target sysinit.target. Feb 9 18:55:40.147240 systemd[1]: Started motdgen.path. Feb 9 18:55:40.147877 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:55:40.148967 systemd[1]: Started logrotate.timer. Feb 9 18:55:40.149675 systemd[1]: Started mdadm.timer. Feb 9 18:55:40.150263 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:55:40.150997 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:55:40.151032 systemd[1]: Reached target paths.target. Feb 9 18:55:40.151676 systemd[1]: Reached target timers.target. Feb 9 18:55:40.152607 systemd[1]: Listening on dbus.socket. Feb 9 18:55:40.154179 systemd[1]: Starting docker.socket... Feb 9 18:55:40.156770 systemd[1]: Listening on sshd.socket. Feb 9 18:55:40.157449 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:55:40.157763 systemd[1]: Listening on docker.socket. Feb 9 18:55:40.158459 systemd[1]: Reached target sockets.target. Feb 9 18:55:40.159093 systemd[1]: Reached target basic.target. Feb 9 18:55:40.159746 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:55:40.159772 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:55:40.160551 systemd[1]: Starting containerd.service... Feb 9 18:55:40.162042 systemd[1]: Starting dbus.service... Feb 9 18:55:40.163551 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:55:40.165147 systemd[1]: Starting extend-filesystems.service... Feb 9 18:55:40.165917 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:55:40.166968 systemd[1]: Starting motdgen.service... Feb 9 18:55:40.168973 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:55:40.170894 systemd[1]: Starting prepare-critools.service... Feb 9 18:55:40.173366 jq[1088]: false Feb 9 18:55:40.172973 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:55:40.175167 systemd[1]: Starting sshd-keygen.service... Feb 9 18:55:40.178020 extend-filesystems[1089]: Found sr0 Feb 9 18:55:40.178194 systemd[1]: Starting systemd-logind.service... Feb 9 18:55:40.178772 extend-filesystems[1089]: Found vda Feb 9 18:55:40.182506 extend-filesystems[1089]: Found vda1 Feb 9 18:55:40.182506 extend-filesystems[1089]: Found vda2 Feb 9 18:55:40.182506 extend-filesystems[1089]: Found vda3 Feb 9 18:55:40.182506 extend-filesystems[1089]: Found usr Feb 9 18:55:40.182506 extend-filesystems[1089]: Found vda4 Feb 9 18:55:40.182506 extend-filesystems[1089]: Found vda6 Feb 9 18:55:40.182506 extend-filesystems[1089]: Found vda7 Feb 9 18:55:40.182506 extend-filesystems[1089]: Found vda9 Feb 9 18:55:40.182506 extend-filesystems[1089]: Checking size of /dev/vda9 Feb 9 18:55:40.181222 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:55:40.181287 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:55:40.181804 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:55:40.182632 systemd[1]: Starting update-engine.service... Feb 9 18:55:40.184236 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:55:40.188270 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:55:40.188746 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:55:40.189073 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:55:40.189250 systemd[1]: Finished motdgen.service. Feb 9 18:55:40.190987 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:55:40.191211 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:55:40.203242 tar[1109]: crictl Feb 9 18:55:40.202708 dbus-daemon[1087]: [system] SELinux support is enabled Feb 9 18:55:40.203714 jq[1106]: true Feb 9 18:55:40.203793 tar[1108]: ./ Feb 9 18:55:40.203793 tar[1108]: ./macvlan Feb 9 18:55:40.203295 systemd[1]: Started dbus.service. Feb 9 18:55:40.206233 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:55:40.206258 systemd[1]: Reached target system-config.target. Feb 9 18:55:40.207056 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:55:40.208758 jq[1115]: true Feb 9 18:55:40.207074 systemd[1]: Reached target user-config.target. Feb 9 18:55:40.254683 tar[1108]: ./static Feb 9 18:55:40.281540 bash[1135]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:55:40.284905 systemd-logind[1100]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 18:55:40.284928 systemd-logind[1100]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 18:55:40.286160 systemd-logind[1100]: New seat seat0. Feb 9 18:55:40.289823 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:55:40.290283 tar[1108]: ./vlan Feb 9 18:55:40.293569 systemd[1]: Started systemd-logind.service. Feb 9 18:55:40.298784 env[1114]: time="2024-02-09T18:55:40.298746983Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:55:40.305670 update_engine[1105]: I0209 18:55:40.305284 1105 main.cc:92] Flatcar Update Engine starting Feb 9 18:55:40.310628 systemd[1]: Started update-engine.service. Feb 9 18:55:40.310858 update_engine[1105]: I0209 18:55:40.310688 1105 update_check_scheduler.cc:74] Next update check in 3m11s Feb 9 18:55:40.313048 systemd[1]: Started locksmithd.service. Feb 9 18:55:40.316992 extend-filesystems[1089]: Resized partition /dev/vda9 Feb 9 18:55:40.318331 extend-filesystems[1143]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 18:55:40.343102 env[1114]: time="2024-02-09T18:55:40.342952698Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:55:40.345642 env[1114]: time="2024-02-09T18:55:40.345604160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.349635368Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.349673760Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.349886690Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.349901938Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.349914402Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.349922877Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.349984914Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.350201279Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.350290978Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:55:40.350464 env[1114]: time="2024-02-09T18:55:40.350303411Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:55:40.350711 env[1114]: time="2024-02-09T18:55:40.350338687Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:55:40.350711 env[1114]: time="2024-02-09T18:55:40.350349628Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:55:40.355487 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 18:55:40.363433 tar[1108]: ./portmap Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374190048Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374258306Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374273295Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374323158Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374338837Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374351191Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374365497Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374417445Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374430119Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374445327Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374457310Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374528283Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374653137Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:55:40.375796 env[1114]: time="2024-02-09T18:55:40.374736633Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375018011Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375060110Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375074948Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375144057Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375156871Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375170156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375180115Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375250968Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375276626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375288057Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375297966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375309037Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375462534Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375494174Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.376187 env[1114]: time="2024-02-09T18:55:40.375509082Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.377186 env[1114]: time="2024-02-09T18:55:40.375520974Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:55:40.377186 env[1114]: time="2024-02-09T18:55:40.375536092Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:55:40.377186 env[1114]: time="2024-02-09T18:55:40.375545460Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:55:40.377186 env[1114]: time="2024-02-09T18:55:40.375573973Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:55:40.377186 env[1114]: time="2024-02-09T18:55:40.375609340Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:55:40.377286 env[1114]: time="2024-02-09T18:55:40.376456258Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:55:40.377286 env[1114]: time="2024-02-09T18:55:40.376522582Z" level=info msg="Connect containerd service" Feb 9 18:55:40.377286 env[1114]: time="2024-02-09T18:55:40.376565302Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:55:40.379400 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 18:55:40.406859 locksmithd[1142]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:55:40.469424 extend-filesystems[1143]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 18:55:40.469424 extend-filesystems[1143]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 18:55:40.469424 extend-filesystems[1143]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 18:55:40.472643 extend-filesystems[1089]: Resized filesystem in /dev/vda9 Feb 9 18:55:40.470896 systemd[1]: Started containerd.service. Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.469955298Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.470090241Z" level=info msg="Start subscribing containerd event" Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.470157938Z" level=info msg="Start recovering state" Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.470220415Z" level=info msg="Start event monitor" Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.470236355Z" level=info msg="Start snapshots syncer" Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.470243819Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.470251043Z" level=info msg="Start streaming server" Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.470676531Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:55:40.473882 env[1114]: time="2024-02-09T18:55:40.470711937Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:55:40.472939 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:55:40.473074 systemd[1]: Finished extend-filesystems.service. Feb 9 18:55:40.476380 env[1114]: time="2024-02-09T18:55:40.476345971Z" level=info msg="containerd successfully booted in 0.181189s" Feb 9 18:55:40.498706 tar[1108]: ./host-local Feb 9 18:55:40.522628 tar[1108]: ./vrf Feb 9 18:55:40.595585 tar[1108]: ./bridge Feb 9 18:55:40.626742 tar[1108]: ./tuning Feb 9 18:55:40.653048 tar[1108]: ./firewall Feb 9 18:55:40.687045 tar[1108]: ./host-device Feb 9 18:55:40.815042 tar[1108]: ./sbr Feb 9 18:55:40.837213 sshd_keygen[1117]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:55:40.845997 tar[1108]: ./loopback Feb 9 18:55:40.854233 systemd[1]: Finished sshd-keygen.service. Feb 9 18:55:40.856038 systemd[1]: Starting issuegen.service... Feb 9 18:55:40.860720 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:55:40.860826 systemd[1]: Finished issuegen.service. Feb 9 18:55:40.862318 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:55:40.866541 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:55:40.868055 systemd[1]: Started getty@tty1.service. Feb 9 18:55:40.869479 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 18:55:40.870190 systemd[1]: Reached target getty.target. Feb 9 18:55:40.875902 tar[1108]: ./dhcp Feb 9 18:55:40.889026 systemd[1]: Created slice system-sshd.slice. Feb 9 18:55:40.890646 systemd[1]: Started sshd@0-10.0.0.90:22-10.0.0.1:52432.service. Feb 9 18:55:40.932989 sshd[1168]: Accepted publickey for core from 10.0.0.1 port 52432 ssh2: RSA SHA256:ykpv2PfBe3Q14nkyYOIn6pLGnIi82XRDx9K/jsWifZc Feb 9 18:55:40.935280 sshd[1168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:40.942863 systemd[1]: Created slice user-500.slice. Feb 9 18:55:40.944491 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:55:40.949642 systemd[1]: Finished prepare-critools.service. Feb 9 18:55:40.949878 systemd-logind[1100]: New session 1 of user core. Feb 9 18:55:40.952916 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:55:40.954780 systemd[1]: Starting user@500.service... Feb 9 18:55:40.956988 (systemd)[1172]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:40.957593 tar[1108]: ./ptp Feb 9 18:55:40.985782 tar[1108]: ./ipvlan Feb 9 18:55:41.015584 tar[1108]: ./bandwidth Feb 9 18:55:41.019921 systemd[1172]: Queued start job for default target default.target. Feb 9 18:55:41.020346 systemd[1172]: Reached target paths.target. Feb 9 18:55:41.020366 systemd[1172]: Reached target sockets.target. Feb 9 18:55:41.020379 systemd[1172]: Reached target timers.target. Feb 9 18:55:41.020413 systemd[1172]: Reached target basic.target. Feb 9 18:55:41.020508 systemd[1]: Started user@500.service. Feb 9 18:55:41.020994 systemd[1172]: Reached target default.target. Feb 9 18:55:41.021020 systemd[1172]: Startup finished in 59ms. Feb 9 18:55:41.021961 systemd[1]: Started session-1.scope. Feb 9 18:55:41.050195 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:55:41.063829 systemd[1]: Reached target multi-user.target. Feb 9 18:55:41.065816 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:55:41.073449 systemd[1]: Started sshd@1-10.0.0.90:22-10.0.0.1:52434.service. Feb 9 18:55:41.075569 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:55:41.075688 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:55:41.076749 systemd[1]: Startup finished in 538ms (kernel) + 5.073s (initrd) + 5.394s (userspace) = 11.007s. Feb 9 18:55:41.112345 sshd[1184]: Accepted publickey for core from 10.0.0.1 port 52434 ssh2: RSA SHA256:ykpv2PfBe3Q14nkyYOIn6pLGnIi82XRDx9K/jsWifZc Feb 9 18:55:41.113457 sshd[1184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:41.116826 systemd-logind[1100]: New session 2 of user core. Feb 9 18:55:41.117531 systemd[1]: Started session-2.scope. Feb 9 18:55:41.171990 sshd[1184]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:41.175278 systemd[1]: sshd@1-10.0.0.90:22-10.0.0.1:52434.service: Deactivated successfully. Feb 9 18:55:41.175932 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 18:55:41.176433 systemd-logind[1100]: Session 2 logged out. Waiting for processes to exit. Feb 9 18:55:41.177863 systemd[1]: Started sshd@2-10.0.0.90:22-10.0.0.1:52450.service. Feb 9 18:55:41.178643 systemd-logind[1100]: Removed session 2. Feb 9 18:55:41.209529 systemd-networkd[1014]: eth0: Gained IPv6LL Feb 9 18:55:41.219006 sshd[1190]: Accepted publickey for core from 10.0.0.1 port 52450 ssh2: RSA SHA256:ykpv2PfBe3Q14nkyYOIn6pLGnIi82XRDx9K/jsWifZc Feb 9 18:55:41.220076 sshd[1190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:41.223481 systemd-logind[1100]: New session 3 of user core. Feb 9 18:55:41.224194 systemd[1]: Started session-3.scope. Feb 9 18:55:41.273598 sshd[1190]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:41.279028 systemd[1]: sshd@2-10.0.0.90:22-10.0.0.1:52450.service: Deactivated successfully. Feb 9 18:55:41.279618 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 18:55:41.280237 systemd-logind[1100]: Session 3 logged out. Waiting for processes to exit. Feb 9 18:55:41.281231 systemd[1]: Started sshd@3-10.0.0.90:22-10.0.0.1:52466.service. Feb 9 18:55:41.282088 systemd-logind[1100]: Removed session 3. Feb 9 18:55:41.318563 sshd[1196]: Accepted publickey for core from 10.0.0.1 port 52466 ssh2: RSA SHA256:ykpv2PfBe3Q14nkyYOIn6pLGnIi82XRDx9K/jsWifZc Feb 9 18:55:41.319610 sshd[1196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:41.322910 systemd-logind[1100]: New session 4 of user core. Feb 9 18:55:41.323814 systemd[1]: Started session-4.scope. Feb 9 18:55:41.378425 sshd[1196]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:41.381068 systemd[1]: sshd@3-10.0.0.90:22-10.0.0.1:52466.service: Deactivated successfully. Feb 9 18:55:41.381549 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 18:55:41.382058 systemd-logind[1100]: Session 4 logged out. Waiting for processes to exit. Feb 9 18:55:41.382943 systemd[1]: Started sshd@4-10.0.0.90:22-10.0.0.1:52482.service. Feb 9 18:55:41.383694 systemd-logind[1100]: Removed session 4. Feb 9 18:55:41.424144 sshd[1202]: Accepted publickey for core from 10.0.0.1 port 52482 ssh2: RSA SHA256:ykpv2PfBe3Q14nkyYOIn6pLGnIi82XRDx9K/jsWifZc Feb 9 18:55:41.425294 sshd[1202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:41.428533 systemd-logind[1100]: New session 5 of user core. Feb 9 18:55:41.429296 systemd[1]: Started session-5.scope. Feb 9 18:55:41.484096 sudo[1205]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 18:55:41.484307 sudo[1205]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:55:41.491667 dbus-daemon[1087]: \xd0]\xe2\xb7XU: received setenforce notice (enforcing=-71128544) Feb 9 18:55:41.493607 sudo[1205]: pam_unix(sudo:session): session closed for user root Feb 9 18:55:41.495561 sshd[1202]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:41.498291 systemd[1]: sshd@4-10.0.0.90:22-10.0.0.1:52482.service: Deactivated successfully. Feb 9 18:55:41.498808 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 18:55:41.499298 systemd-logind[1100]: Session 5 logged out. Waiting for processes to exit. Feb 9 18:55:41.500258 systemd[1]: Started sshd@5-10.0.0.90:22-10.0.0.1:52484.service. Feb 9 18:55:41.500838 systemd-logind[1100]: Removed session 5. Feb 9 18:55:41.539709 sshd[1209]: Accepted publickey for core from 10.0.0.1 port 52484 ssh2: RSA SHA256:ykpv2PfBe3Q14nkyYOIn6pLGnIi82XRDx9K/jsWifZc Feb 9 18:55:41.540899 sshd[1209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:41.544563 systemd-logind[1100]: New session 6 of user core. Feb 9 18:55:41.545305 systemd[1]: Started session-6.scope. Feb 9 18:55:41.597908 sudo[1213]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 18:55:41.598062 sudo[1213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:55:41.601015 sudo[1213]: pam_unix(sudo:session): session closed for user root Feb 9 18:55:41.604486 sudo[1212]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 18:55:41.604651 sudo[1212]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:55:41.612824 systemd[1]: Stopping audit-rules.service... Feb 9 18:55:41.613000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:55:41.614076 auditctl[1216]: No rules Feb 9 18:55:41.614316 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 18:55:41.614453 systemd[1]: Stopped audit-rules.service. Feb 9 18:55:41.614595 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 9 18:55:41.614683 kernel: audit: type=1305 audit(1707504941.613:153): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:55:41.613000 audit[1216]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff2a85b1c0 a2=420 a3=0 items=0 ppid=1 pid=1216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:41.616204 systemd[1]: Starting audit-rules.service... Feb 9 18:55:41.618799 kernel: audit: type=1300 audit(1707504941.613:153): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff2a85b1c0 a2=420 a3=0 items=0 ppid=1 pid=1216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:41.618854 kernel: audit: type=1327 audit(1707504941.613:153): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:55:41.613000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:55:41.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.621707 kernel: audit: type=1131 audit(1707504941.614:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.629529 augenrules[1233]: No rules Feb 9 18:55:41.630042 systemd[1]: Finished audit-rules.service. Feb 9 18:55:41.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.630755 sudo[1212]: pam_unix(sudo:session): session closed for user root Feb 9 18:55:41.631853 sshd[1209]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:41.630000 audit[1212]: USER_END pid=1212 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.633691 systemd[1]: sshd@5-10.0.0.90:22-10.0.0.1:52484.service: Deactivated successfully. Feb 9 18:55:41.634192 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 18:55:41.634659 systemd-logind[1100]: Session 6 logged out. Waiting for processes to exit. Feb 9 18:55:41.635260 kernel: audit: type=1130 audit(1707504941.629:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.635295 kernel: audit: type=1106 audit(1707504941.630:156): pid=1212 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.635318 kernel: audit: type=1104 audit(1707504941.630:157): pid=1212 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.630000 audit[1212]: CRED_DISP pid=1212 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.635373 systemd[1]: Started sshd@6-10.0.0.90:22-10.0.0.1:52488.service. Feb 9 18:55:41.636166 systemd-logind[1100]: Removed session 6. Feb 9 18:55:41.632000 audit[1209]: USER_END pid=1209 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:41.640527 kernel: audit: type=1106 audit(1707504941.632:158): pid=1209 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:41.640558 kernel: audit: type=1104 audit(1707504941.632:159): pid=1209 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:41.632000 audit[1209]: CRED_DISP pid=1209 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:41.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.90:22-10.0.0.1:52484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.645396 kernel: audit: type=1131 audit(1707504941.633:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.90:22-10.0.0.1:52484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.90:22-10.0.0.1:52488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.672000 audit[1239]: USER_ACCT pid=1239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:41.672580 sshd[1239]: Accepted publickey for core from 10.0.0.1 port 52488 ssh2: RSA SHA256:ykpv2PfBe3Q14nkyYOIn6pLGnIi82XRDx9K/jsWifZc Feb 9 18:55:41.673000 audit[1239]: CRED_ACQ pid=1239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:41.673000 audit[1239]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde94c4ec0 a2=3 a3=0 items=0 ppid=1 pid=1239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:41.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:55:41.673679 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:55:41.676837 systemd-logind[1100]: New session 7 of user core. Feb 9 18:55:41.677529 systemd[1]: Started session-7.scope. Feb 9 18:55:41.680000 audit[1239]: USER_START pid=1239 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:41.681000 audit[1241]: CRED_ACQ pid=1241 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:41.730000 audit[1242]: USER_ACCT pid=1242 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.730000 audit[1242]: CRED_REFR pid=1242 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:41.731097 sudo[1242]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 18:55:41.731323 sudo[1242]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:55:41.732000 audit[1242]: USER_START pid=1242 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:42.248159 systemd[1]: Reloading. Feb 9 18:55:42.319636 /usr/lib/systemd/system-generators/torcx-generator[1271]: time="2024-02-09T18:55:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:55:42.319949 /usr/lib/systemd/system-generators/torcx-generator[1271]: time="2024-02-09T18:55:42Z" level=info msg="torcx already run" Feb 9 18:55:42.387931 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:55:42.387948 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:55:42.404517 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit: BPF prog-id=31 op=LOAD Feb 9 18:55:42.461000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit: BPF prog-id=32 op=LOAD Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.461000 audit: BPF prog-id=33 op=LOAD Feb 9 18:55:42.461000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:55:42.462000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit: BPF prog-id=34 op=LOAD Feb 9 18:55:42.462000 audit: BPF prog-id=21 op=UNLOAD Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit: BPF prog-id=35 op=LOAD Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.462000 audit: BPF prog-id=36 op=LOAD Feb 9 18:55:42.462000 audit: BPF prog-id=22 op=UNLOAD Feb 9 18:55:42.462000 audit: BPF prog-id=23 op=UNLOAD Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.463000 audit: BPF prog-id=37 op=LOAD Feb 9 18:55:42.463000 audit: BPF prog-id=24 op=UNLOAD Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit: BPF prog-id=38 op=LOAD Feb 9 18:55:42.467000 audit: BPF prog-id=29 op=UNLOAD Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit: BPF prog-id=39 op=LOAD Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.467000 audit: BPF prog-id=40 op=LOAD Feb 9 18:55:42.467000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:55:42.467000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit: BPF prog-id=41 op=LOAD Feb 9 18:55:42.468000 audit: BPF prog-id=26 op=UNLOAD Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit: BPF prog-id=42 op=LOAD Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.469000 audit: BPF prog-id=43 op=LOAD Feb 9 18:55:42.469000 audit: BPF prog-id=27 op=UNLOAD Feb 9 18:55:42.469000 audit: BPF prog-id=28 op=UNLOAD Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.470000 audit: BPF prog-id=44 op=LOAD Feb 9 18:55:42.470000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.472000 audit: BPF prog-id=45 op=LOAD Feb 9 18:55:42.472000 audit: BPF prog-id=25 op=UNLOAD Feb 9 18:55:42.479980 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:55:42.486274 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:55:42.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:42.486666 systemd[1]: Reached target network-online.target. Feb 9 18:55:42.487739 systemd[1]: Started kubelet.service. Feb 9 18:55:42.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:42.496240 systemd[1]: Starting coreos-metadata.service... Feb 9 18:55:42.503502 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 9 18:55:42.503620 systemd[1]: Finished coreos-metadata.service. Feb 9 18:55:42.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:42.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:42.539046 kubelet[1313]: E0209 18:55:42.538979 1313 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 18:55:42.540954 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:55:42.541070 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:55:42.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:55:42.714499 systemd[1]: Stopped kubelet.service. Feb 9 18:55:42.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:42.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:42.726828 systemd[1]: Reloading. Feb 9 18:55:42.788642 /usr/lib/systemd/system-generators/torcx-generator[1381]: time="2024-02-09T18:55:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:55:42.788678 /usr/lib/systemd/system-generators/torcx-generator[1381]: time="2024-02-09T18:55:42Z" level=info msg="torcx already run" Feb 9 18:55:42.854131 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:55:42.854151 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:55:42.876471 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit: BPF prog-id=46 op=LOAD Feb 9 18:55:42.941000 audit: BPF prog-id=31 op=UNLOAD Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit: BPF prog-id=47 op=LOAD Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.941000 audit: BPF prog-id=48 op=LOAD Feb 9 18:55:42.941000 audit: BPF prog-id=32 op=UNLOAD Feb 9 18:55:42.941000 audit: BPF prog-id=33 op=UNLOAD Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit: BPF prog-id=49 op=LOAD Feb 9 18:55:42.942000 audit: BPF prog-id=34 op=UNLOAD Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit: BPF prog-id=50 op=LOAD Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.942000 audit: BPF prog-id=51 op=LOAD Feb 9 18:55:42.942000 audit: BPF prog-id=35 op=UNLOAD Feb 9 18:55:42.942000 audit: BPF prog-id=36 op=UNLOAD Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.943000 audit: BPF prog-id=52 op=LOAD Feb 9 18:55:42.943000 audit: BPF prog-id=37 op=UNLOAD Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit: BPF prog-id=53 op=LOAD Feb 9 18:55:42.946000 audit: BPF prog-id=38 op=UNLOAD Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit: BPF prog-id=54 op=LOAD Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.946000 audit: BPF prog-id=55 op=LOAD Feb 9 18:55:42.946000 audit: BPF prog-id=39 op=UNLOAD Feb 9 18:55:42.946000 audit: BPF prog-id=40 op=UNLOAD Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit: BPF prog-id=56 op=LOAD Feb 9 18:55:42.947000 audit: BPF prog-id=41 op=UNLOAD Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit: BPF prog-id=57 op=LOAD Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.947000 audit: BPF prog-id=58 op=LOAD Feb 9 18:55:42.947000 audit: BPF prog-id=42 op=UNLOAD Feb 9 18:55:42.947000 audit: BPF prog-id=43 op=UNLOAD Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.949000 audit: BPF prog-id=59 op=LOAD Feb 9 18:55:42.949000 audit: BPF prog-id=44 op=UNLOAD Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:42.950000 audit: BPF prog-id=60 op=LOAD Feb 9 18:55:42.950000 audit: BPF prog-id=45 op=UNLOAD Feb 9 18:55:42.960434 systemd[1]: Started kubelet.service. Feb 9 18:55:42.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:43.003930 kubelet[1421]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 18:55:43.004398 kubelet[1421]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:55:43.004568 kubelet[1421]: I0209 18:55:43.004440 1421 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:55:43.006066 kubelet[1421]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 18:55:43.006066 kubelet[1421]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:55:43.242576 kubelet[1421]: I0209 18:55:43.242453 1421 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 18:55:43.242576 kubelet[1421]: I0209 18:55:43.242485 1421 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:55:43.242753 kubelet[1421]: I0209 18:55:43.242708 1421 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 18:55:43.244717 kubelet[1421]: I0209 18:55:43.244686 1421 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:55:43.247868 kubelet[1421]: I0209 18:55:43.247836 1421 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:55:43.248032 kubelet[1421]: I0209 18:55:43.248010 1421 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:55:43.248131 kubelet[1421]: I0209 18:55:43.248110 1421 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:55:43.248295 kubelet[1421]: I0209 18:55:43.248138 1421 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:55:43.248295 kubelet[1421]: I0209 18:55:43.248150 1421 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 18:55:43.248295 kubelet[1421]: I0209 18:55:43.248235 1421 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:55:43.254516 kubelet[1421]: I0209 18:55:43.254485 1421 kubelet.go:398] "Attempting to sync node with API server" Feb 9 18:55:43.254516 kubelet[1421]: I0209 18:55:43.254518 1421 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:55:43.254702 kubelet[1421]: I0209 18:55:43.254563 1421 kubelet.go:297] "Adding apiserver pod source" Feb 9 18:55:43.254702 kubelet[1421]: I0209 18:55:43.254578 1421 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:55:43.254907 kubelet[1421]: E0209 18:55:43.254875 1421 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:43.255059 kubelet[1421]: E0209 18:55:43.254936 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:43.255645 kubelet[1421]: I0209 18:55:43.255621 1421 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:55:43.255901 kubelet[1421]: W0209 18:55:43.255887 1421 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 18:55:43.256223 kubelet[1421]: I0209 18:55:43.256200 1421 server.go:1186] "Started kubelet" Feb 9 18:55:43.256562 kubelet[1421]: I0209 18:55:43.256545 1421 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:55:43.256000 audit[1421]: AVC avc: denied { mac_admin } for pid=1421 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:43.256000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:55:43.256000 audit[1421]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a8d7a0 a1=c0006549a8 a2=c000a8d770 a3=25 items=0 ppid=1 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.257267 kubelet[1421]: I0209 18:55:43.257206 1421 server.go:451] "Adding debug handlers to kubelet server" Feb 9 18:55:43.257298 kubelet[1421]: E0209 18:55:43.257267 1421 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:55:43.257321 kubelet[1421]: E0209 18:55:43.257300 1421 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:55:43.256000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:55:43.257519 kubelet[1421]: I0209 18:55:43.257503 1421 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:55:43.257000 audit[1421]: AVC avc: denied { mac_admin } for pid=1421 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:43.257000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:55:43.257000 audit[1421]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004d1000 a1=c0006549c0 a2=c000a8d830 a3=25 items=0 ppid=1 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.257000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:55:43.257881 kubelet[1421]: I0209 18:55:43.257853 1421 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:55:43.257933 kubelet[1421]: I0209 18:55:43.257927 1421 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:55:43.258144 kubelet[1421]: I0209 18:55:43.258128 1421 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 18:55:43.259301 kubelet[1421]: I0209 18:55:43.259279 1421 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 18:55:43.259857 kubelet[1421]: E0209 18:55:43.259678 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:43.259857 kubelet[1421]: E0209 18:55:43.259688 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fb0220d2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 256182994, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 256182994, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.260562 kubelet[1421]: W0209 18:55:43.260546 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:43.260638 kubelet[1421]: E0209 18:55:43.260573 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:43.260638 kubelet[1421]: W0209 18:55:43.260547 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:43.260638 kubelet[1421]: E0209 18:55:43.260589 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:43.260638 kubelet[1421]: W0209 18:55:43.260598 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:43.260638 kubelet[1421]: E0209 18:55:43.260631 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:43.261040 kubelet[1421]: E0209 18:55:43.261030 1421 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.0.0.90" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 18:55:43.261418 kubelet[1421]: E0209 18:55:43.261200 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fb1304a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 257289890, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 257289890, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.279000 audit[1434]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.279000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe58886170 a2=0 a3=7ffe5888615c items=0 ppid=1421 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:55:43.280039 kubelet[1421]: I0209 18:55:43.280009 1421 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:55:43.280039 kubelet[1421]: I0209 18:55:43.280030 1421 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:55:43.280216 kubelet[1421]: I0209 18:55:43.280069 1421 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:55:43.280596 kubelet[1421]: E0209 18:55:43.280510 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e1175", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.90 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278985589, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278985589, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.281000 audit[1438]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.281000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc5d7465b0 a2=0 a3=7ffc5d74659c items=0 ppid=1421 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:55:43.281942 kubelet[1421]: E0209 18:55:43.281854 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e2a27", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.90 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278991911, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278991911, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.282709 kubelet[1421]: E0209 18:55:43.282635 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e4225", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.90 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278998053, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278998053, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.282921 kubelet[1421]: I0209 18:55:43.282898 1421 policy_none.go:49] "None policy: Start" Feb 9 18:55:43.283603 kubelet[1421]: I0209 18:55:43.283571 1421 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:55:43.283603 kubelet[1421]: I0209 18:55:43.283593 1421 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:55:43.288659 systemd[1]: Created slice kubepods.slice. Feb 9 18:55:43.291819 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 18:55:43.294415 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 18:55:43.283000 audit[1441]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.283000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2a8874b0 a2=0 a3=7ffd2a88749c items=0 ppid=1421 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:55:43.297000 audit[1446]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.297000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa866fe00 a2=0 a3=7fffa866fdec items=0 ppid=1421 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:55:43.301138 kubelet[1421]: I0209 18:55:43.301095 1421 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:55:43.300000 audit[1421]: AVC avc: denied { mac_admin } for pid=1421 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:55:43.300000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:55:43.300000 audit[1421]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b161b0 a1=c000654690 a2=c000b16180 a3=25 items=0 ppid=1 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.300000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:55:43.301328 kubelet[1421]: I0209 18:55:43.301199 1421 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:55:43.301694 kubelet[1421]: I0209 18:55:43.301450 1421 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:55:43.301844 kubelet[1421]: E0209 18:55:43.301810 1421 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.90\" not found" Feb 9 18:55:43.303365 kubelet[1421]: E0209 18:55:43.303290 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fdbf868c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 302149772, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 302149772, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.335000 audit[1451]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.335000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd1bffaad0 a2=0 a3=7ffd1bffaabc items=0 ppid=1421 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 18:55:43.335000 audit[1452]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.335000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff761b1fd0 a2=0 a3=7fff761b1fbc items=0 ppid=1421 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 18:55:43.339000 audit[1455]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.339000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd39d91c80 a2=0 a3=7ffd39d91c6c items=0 ppid=1421 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 18:55:43.342000 audit[1458]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.342000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc5d69b520 a2=0 a3=7ffc5d69b50c items=0 ppid=1421 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 18:55:43.343000 audit[1459]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.343000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec3e28520 a2=0 a3=7ffec3e2850c items=0 ppid=1421 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 18:55:43.344000 audit[1460]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.344000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1f60f4e0 a2=0 a3=7ffd1f60f4cc items=0 ppid=1421 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:55:43.345000 audit[1462]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.345000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc61978bc0 a2=0 a3=7ffc61978bac items=0 ppid=1421 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 18:55:43.360492 kubelet[1421]: I0209 18:55:43.360463 1421 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.90" Feb 9 18:55:43.361296 kubelet[1421]: E0209 18:55:43.361265 1421 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.90" Feb 9 18:55:43.361743 kubelet[1421]: E0209 18:55:43.361655 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e1175", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.90 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278985589, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 360398889, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e1175" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.362529 kubelet[1421]: E0209 18:55:43.362436 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e2a27", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.90 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278991911, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 360406854, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e2a27" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.363236 kubelet[1421]: E0209 18:55:43.363172 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e4225", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.90 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278998053, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 360410942, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e4225" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.347000 audit[1464]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.347000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd1fb53d0 a2=0 a3=7fffd1fb53bc items=0 ppid=1421 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:55:43.368000 audit[1467]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.368000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffebf86cff0 a2=0 a3=7ffebf86cfdc items=0 ppid=1421 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 18:55:43.370000 audit[1469]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.370000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff29b17620 a2=0 a3=7fff29b1760c items=0 ppid=1421 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 18:55:43.376000 audit[1472]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.376000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffeb94c3640 a2=0 a3=7ffeb94c362c items=0 ppid=1421 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 18:55:43.376765 kubelet[1421]: I0209 18:55:43.376732 1421 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:55:43.377000 audit[1474]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.377000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1007aa60 a2=0 a3=7ffc1007aa4c items=0 ppid=1421 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:55:43.377000 audit[1475]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.377000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd19d13370 a2=0 a3=7ffd19d1335c items=0 ppid=1421 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:55:43.378000 audit[1476]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:55:43.378000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec2665a80 a2=0 a3=7ffec2665a6c items=0 ppid=1421 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:55:43.379000 audit[1473]: NETFILTER_CFG table=mangle:20 family=10 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.379000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeeff69440 a2=0 a3=10e3 items=0 ppid=1421 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:55:43.380000 audit[1477]: NETFILTER_CFG table=nat:21 family=10 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.380000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc35547540 a2=0 a3=7ffc3554752c items=0 ppid=1421 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 18:55:43.381000 audit[1479]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.381000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe356b53d0 a2=0 a3=7ffe356b53bc items=0 ppid=1421 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 18:55:43.382000 audit[1480]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.382000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc5f42b8b0 a2=0 a3=7ffc5f42b89c items=0 ppid=1421 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:55:43.384000 audit[1482]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.384000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffcd2521000 a2=0 a3=7ffcd2520fec items=0 ppid=1421 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 18:55:43.385000 audit[1483]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.385000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffebbb3b9e0 a2=0 a3=7ffebbb3b9cc items=0 ppid=1421 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 18:55:43.386000 audit[1484]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.386000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd811fbf50 a2=0 a3=7ffd811fbf3c items=0 ppid=1421 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:55:43.387000 audit[1486]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.387000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd6353fb30 a2=0 a3=7ffd6353fb1c items=0 ppid=1421 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 18:55:43.389000 audit[1488]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.389000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcbf6ddeb0 a2=0 a3=7ffcbf6dde9c items=0 ppid=1421 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:55:43.391000 audit[1490]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.391000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff81f315f0 a2=0 a3=7fff81f315dc items=0 ppid=1421 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 18:55:43.393000 audit[1492]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.393000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe1f24eb60 a2=0 a3=7ffe1f24eb4c items=0 ppid=1421 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 18:55:43.395000 audit[1494]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.395000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd9f0fb0b0 a2=0 a3=7ffd9f0fb09c items=0 ppid=1421 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 18:55:43.396241 kubelet[1421]: I0209 18:55:43.396209 1421 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:55:43.396241 kubelet[1421]: I0209 18:55:43.396240 1421 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 18:55:43.396311 kubelet[1421]: I0209 18:55:43.396262 1421 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 18:55:43.396333 kubelet[1421]: E0209 18:55:43.396317 1421 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 18:55:43.396000 audit[1495]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.396000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4c97a490 a2=0 a3=7ffd4c97a47c items=0 ppid=1421 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:55:43.397359 kubelet[1421]: W0209 18:55:43.397255 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:55:43.397359 kubelet[1421]: E0209 18:55:43.397279 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:55:43.397000 audit[1496]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.397000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa04c25c0 a2=0 a3=7fffa04c25ac items=0 ppid=1421 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:55:43.398000 audit[1497]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:55:43.398000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc9ea4130 a2=0 a3=7fffc9ea411c items=0 ppid=1421 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:55:43.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:55:43.463060 kubelet[1421]: E0209 18:55:43.463008 1421 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.0.0.90" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 18:55:43.562205 kubelet[1421]: I0209 18:55:43.562094 1421 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.90" Feb 9 18:55:43.563429 kubelet[1421]: E0209 18:55:43.563313 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e1175", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.90 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278985589, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 562044495, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e1175" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.563429 kubelet[1421]: E0209 18:55:43.563405 1421 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.90" Feb 9 18:55:43.564267 kubelet[1421]: E0209 18:55:43.564223 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e2a27", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.90 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278991911, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 562054934, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e2a27" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.658660 kubelet[1421]: E0209 18:55:43.658553 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e4225", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.90 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278998053, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 562061557, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e4225" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.864953 kubelet[1421]: E0209 18:55:43.864812 1421 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.0.0.90" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 18:55:43.965035 kubelet[1421]: I0209 18:55:43.964996 1421 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.90" Feb 9 18:55:43.966347 kubelet[1421]: E0209 18:55:43.966286 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e1175", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.90 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278985589, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 964947888, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e1175" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:43.966467 kubelet[1421]: E0209 18:55:43.966370 1421 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.90" Feb 9 18:55:44.057777 kubelet[1421]: E0209 18:55:44.057669 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e2a27", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.90 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278991911, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 964962476, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e2a27" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:44.136160 kubelet[1421]: W0209 18:55:44.136064 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:44.136160 kubelet[1421]: E0209 18:55:44.136098 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:44.255899 kubelet[1421]: E0209 18:55:44.255849 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:44.258011 kubelet[1421]: E0209 18:55:44.257929 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e4225", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.90 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278998053, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 964965642, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e4225" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:44.389011 kubelet[1421]: W0209 18:55:44.388858 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:44.389011 kubelet[1421]: E0209 18:55:44.388895 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:44.597883 kubelet[1421]: W0209 18:55:44.597855 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:44.597883 kubelet[1421]: E0209 18:55:44.597883 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:44.666463 kubelet[1421]: E0209 18:55:44.666342 1421 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.0.0.90" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 18:55:44.767559 kubelet[1421]: I0209 18:55:44.767520 1421 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.90" Feb 9 18:55:44.768739 kubelet[1421]: E0209 18:55:44.768646 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e1175", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.90 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278985589, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 44, 767474435, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e1175" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:44.768967 kubelet[1421]: E0209 18:55:44.768788 1421 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.90" Feb 9 18:55:44.769479 kubelet[1421]: E0209 18:55:44.769421 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e2a27", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.90 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278991911, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 44, 767486588, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e2a27" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:44.824519 kubelet[1421]: W0209 18:55:44.824485 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:55:44.824519 kubelet[1421]: E0209 18:55:44.824512 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:55:44.858378 kubelet[1421]: E0209 18:55:44.858290 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e4225", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.90 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278998053, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 44, 767489273, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e4225" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:45.256543 kubelet[1421]: E0209 18:55:45.256481 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:45.906469 kubelet[1421]: W0209 18:55:45.906437 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:45.906469 kubelet[1421]: E0209 18:55:45.906466 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:46.257064 kubelet[1421]: E0209 18:55:46.256942 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:46.267842 kubelet[1421]: E0209 18:55:46.267817 1421 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.0.0.90" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 18:55:46.372150 kubelet[1421]: I0209 18:55:46.372120 1421 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.90" Feb 9 18:55:46.372989 kubelet[1421]: E0209 18:55:46.372958 1421 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.90" Feb 9 18:55:46.373219 kubelet[1421]: E0209 18:55:46.373156 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e1175", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.90 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278985589, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 46, 372067627, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e1175" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:46.374126 kubelet[1421]: E0209 18:55:46.374084 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e2a27", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.90 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278991911, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 46, 372079570, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e2a27" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:46.374900 kubelet[1421]: E0209 18:55:46.374843 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e4225", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.90 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278998053, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 46, 372083237, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e4225" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:46.952694 kubelet[1421]: W0209 18:55:46.952655 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:46.952694 kubelet[1421]: E0209 18:55:46.952691 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:46.956628 kubelet[1421]: W0209 18:55:46.956602 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:46.956739 kubelet[1421]: E0209 18:55:46.956640 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:47.257307 kubelet[1421]: E0209 18:55:47.257133 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:47.922831 kubelet[1421]: W0209 18:55:47.922785 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:55:47.922831 kubelet[1421]: E0209 18:55:47.922822 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:55:48.257600 kubelet[1421]: E0209 18:55:48.257476 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:49.257947 kubelet[1421]: E0209 18:55:49.257855 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:49.469424 kubelet[1421]: E0209 18:55:49.469372 1421 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.0.0.90" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 18:55:49.574421 kubelet[1421]: I0209 18:55:49.574322 1421 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.90" Feb 9 18:55:49.575290 kubelet[1421]: E0209 18:55:49.575262 1421 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.90" Feb 9 18:55:49.575482 kubelet[1421]: E0209 18:55:49.575372 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e1175", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.90 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278985589, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 49, 574286046, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e1175" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:49.576301 kubelet[1421]: E0209 18:55:49.576240 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e2a27", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.90 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278991911, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 49, 574297738, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e2a27" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:49.577121 kubelet[1421]: E0209 18:55:49.577073 1421 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90.17b246b2fc5e4225", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.90", UID:"10.0.0.90", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.90 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.90"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 55, 43, 278998053, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 55, 49, 574300784, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.90.17b246b2fc5e4225" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:55:50.258263 kubelet[1421]: E0209 18:55:50.258199 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:50.864712 kubelet[1421]: W0209 18:55:50.864669 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:50.864712 kubelet[1421]: E0209 18:55:50.864704 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:55:51.258556 kubelet[1421]: E0209 18:55:51.258430 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:51.381262 kubelet[1421]: W0209 18:55:51.381230 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:51.381262 kubelet[1421]: E0209 18:55:51.381257 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:55:52.259141 kubelet[1421]: E0209 18:55:52.259090 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:52.700163 kubelet[1421]: W0209 18:55:52.700058 1421 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:52.700163 kubelet[1421]: E0209 18:55:52.700088 1421 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:55:53.245276 kubelet[1421]: I0209 18:55:53.245226 1421 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 18:55:53.259485 kubelet[1421]: E0209 18:55:53.259447 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:53.302066 kubelet[1421]: E0209 18:55:53.302013 1421 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.90\" not found" Feb 9 18:55:53.604112 kubelet[1421]: E0209 18:55:53.604010 1421 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.90" not found Feb 9 18:55:54.260762 kubelet[1421]: E0209 18:55:54.260713 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:54.864168 kubelet[1421]: E0209 18:55:54.864121 1421 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.90" not found Feb 9 18:55:55.261347 kubelet[1421]: E0209 18:55:55.261212 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:55.873064 kubelet[1421]: E0209 18:55:55.873025 1421 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.90\" not found" node="10.0.0.90" Feb 9 18:55:55.976361 kubelet[1421]: I0209 18:55:55.976321 1421 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.90" Feb 9 18:55:56.262181 kubelet[1421]: E0209 18:55:56.262074 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:56.265050 kubelet[1421]: I0209 18:55:56.265033 1421 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.90" Feb 9 18:55:56.283858 kubelet[1421]: E0209 18:55:56.283828 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:56.384461 kubelet[1421]: E0209 18:55:56.384410 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:56.471834 sudo[1242]: pam_unix(sudo:session): session closed for user root Feb 9 18:55:56.471000 audit[1242]: USER_END pid=1242 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.472523 kernel: kauditd_printk_skb: 474 callbacks suppressed Feb 9 18:55:56.472665 kernel: audit: type=1106 audit(1707504956.471:558): pid=1242 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.473306 sshd[1239]: pam_unix(sshd:session): session closed for user core Feb 9 18:55:56.471000 audit[1242]: CRED_DISP pid=1242 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.475633 systemd[1]: sshd@6-10.0.0.90:22-10.0.0.1:52488.service: Deactivated successfully. Feb 9 18:55:56.476457 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 18:55:56.477028 systemd-logind[1100]: Session 7 logged out. Waiting for processes to exit. Feb 9 18:55:56.477738 systemd-logind[1100]: Removed session 7. Feb 9 18:55:56.477831 kernel: audit: type=1104 audit(1707504956.471:559): pid=1242 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.477880 kernel: audit: type=1106 audit(1707504956.474:560): pid=1239 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:56.474000 audit[1239]: USER_END pid=1239 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:56.474000 audit[1239]: CRED_DISP pid=1239 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:56.484503 kernel: audit: type=1104 audit(1707504956.474:561): pid=1239 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 18:55:56.484563 kernel: audit: type=1131 audit(1707504956.475:562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.90:22-10.0.0.1:52488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.90:22-10.0.0.1:52488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:55:56.484650 kubelet[1421]: E0209 18:55:56.484555 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:56.585278 kubelet[1421]: E0209 18:55:56.585148 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:56.686172 kubelet[1421]: E0209 18:55:56.686111 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:56.786842 kubelet[1421]: E0209 18:55:56.786805 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:56.887411 kubelet[1421]: E0209 18:55:56.887272 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:56.988097 kubelet[1421]: E0209 18:55:56.988033 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.088793 kubelet[1421]: E0209 18:55:57.088717 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.189550 kubelet[1421]: E0209 18:55:57.189410 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.263603 kubelet[1421]: E0209 18:55:57.263528 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:57.289797 kubelet[1421]: E0209 18:55:57.289732 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.390568 kubelet[1421]: E0209 18:55:57.390478 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.491539 kubelet[1421]: E0209 18:55:57.491414 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.592117 kubelet[1421]: E0209 18:55:57.592040 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.692671 kubelet[1421]: E0209 18:55:57.692610 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.793640 kubelet[1421]: E0209 18:55:57.793508 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.894287 kubelet[1421]: E0209 18:55:57.894232 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:57.995077 kubelet[1421]: E0209 18:55:57.995023 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.096099 kubelet[1421]: E0209 18:55:58.095975 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.196698 kubelet[1421]: E0209 18:55:58.196635 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.264581 kubelet[1421]: E0209 18:55:58.264528 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:58.297761 kubelet[1421]: E0209 18:55:58.297718 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.398440 kubelet[1421]: E0209 18:55:58.398249 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.498779 kubelet[1421]: E0209 18:55:58.498738 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.599363 kubelet[1421]: E0209 18:55:58.599310 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.699914 kubelet[1421]: E0209 18:55:58.699805 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.800537 kubelet[1421]: E0209 18:55:58.800478 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:58.901048 kubelet[1421]: E0209 18:55:58.901004 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.001622 kubelet[1421]: E0209 18:55:59.001498 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.102149 kubelet[1421]: E0209 18:55:59.102091 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.202806 kubelet[1421]: E0209 18:55:59.202750 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.265685 kubelet[1421]: E0209 18:55:59.265533 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:55:59.303851 kubelet[1421]: E0209 18:55:59.303795 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.404831 kubelet[1421]: E0209 18:55:59.404766 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.505500 kubelet[1421]: E0209 18:55:59.505442 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.606230 kubelet[1421]: E0209 18:55:59.606104 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.706950 kubelet[1421]: E0209 18:55:59.706892 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.807627 kubelet[1421]: E0209 18:55:59.807566 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:55:59.908349 kubelet[1421]: E0209 18:55:59.908232 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.008988 kubelet[1421]: E0209 18:56:00.008932 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.109646 kubelet[1421]: E0209 18:56:00.109582 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.210373 kubelet[1421]: E0209 18:56:00.210261 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.266189 kubelet[1421]: E0209 18:56:00.266146 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:00.311405 kubelet[1421]: E0209 18:56:00.311341 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.412480 kubelet[1421]: E0209 18:56:00.412430 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.513166 kubelet[1421]: E0209 18:56:00.513033 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.613711 kubelet[1421]: E0209 18:56:00.613656 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.714300 kubelet[1421]: E0209 18:56:00.714245 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.815184 kubelet[1421]: E0209 18:56:00.815070 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:00.915670 kubelet[1421]: E0209 18:56:00.915601 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:01.016253 kubelet[1421]: E0209 18:56:01.016209 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:01.116911 kubelet[1421]: E0209 18:56:01.116781 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:01.217417 kubelet[1421]: E0209 18:56:01.217347 1421 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" Feb 9 18:56:01.266431 kubelet[1421]: E0209 18:56:01.266358 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:01.318253 kubelet[1421]: I0209 18:56:01.318227 1421 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 18:56:01.318588 env[1114]: time="2024-02-09T18:56:01.318545079Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 18:56:01.318895 kubelet[1421]: I0209 18:56:01.318710 1421 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 18:56:02.264734 kubelet[1421]: I0209 18:56:02.264675 1421 apiserver.go:52] "Watching apiserver" Feb 9 18:56:02.266568 kubelet[1421]: E0209 18:56:02.266531 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:02.267280 kubelet[1421]: I0209 18:56:02.267260 1421 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:56:02.267342 kubelet[1421]: I0209 18:56:02.267334 1421 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:56:02.267381 kubelet[1421]: I0209 18:56:02.267372 1421 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:56:02.267652 kubelet[1421]: E0209 18:56:02.267625 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:02.272462 systemd[1]: Created slice kubepods-besteffort-pod75729b98_6a7b_4e76_9b09_167e61c706c1.slice. Feb 9 18:56:02.283002 systemd[1]: Created slice kubepods-besteffort-pod396e5322_c365_4698_abe2_eabb6e7400b6.slice. Feb 9 18:56:02.360121 kubelet[1421]: I0209 18:56:02.360073 1421 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 18:56:02.361833 kubelet[1421]: I0209 18:56:02.361810 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-policysync\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.361914 kubelet[1421]: I0209 18:56:02.361857 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/396e5322-c365-4698-abe2-eabb6e7400b6-tigera-ca-bundle\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.361914 kubelet[1421]: I0209 18:56:02.361904 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-var-run-calico\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.361978 kubelet[1421]: I0209 18:56:02.361949 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-cni-bin-dir\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362010 kubelet[1421]: I0209 18:56:02.361991 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-cni-net-dir\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362057 kubelet[1421]: I0209 18:56:02.362036 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-flexvol-driver-host\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362097 kubelet[1421]: I0209 18:56:02.362077 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tq6zf\" (UniqueName: \"kubernetes.io/projected/75729b98-6a7b-4e76-9b09-167e61c706c1-kube-api-access-tq6zf\") pod \"kube-proxy-62qxc\" (UID: \"75729b98-6a7b-4e76-9b09-167e61c706c1\") " pod="kube-system/kube-proxy-62qxc" Feb 9 18:56:02.362097 kubelet[1421]: I0209 18:56:02.362095 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ed73ea14-de39-40f3-8033-40b7fc317b23-kubelet-dir\") pod \"csi-node-driver-x8mc9\" (UID: \"ed73ea14-de39-40f3-8033-40b7fc317b23\") " pod="calico-system/csi-node-driver-x8mc9" Feb 9 18:56:02.362151 kubelet[1421]: I0209 18:56:02.362111 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/75729b98-6a7b-4e76-9b09-167e61c706c1-lib-modules\") pod \"kube-proxy-62qxc\" (UID: \"75729b98-6a7b-4e76-9b09-167e61c706c1\") " pod="kube-system/kube-proxy-62qxc" Feb 9 18:56:02.362151 kubelet[1421]: I0209 18:56:02.362131 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9k7cd\" (UniqueName: \"kubernetes.io/projected/396e5322-c365-4698-abe2-eabb6e7400b6-kube-api-access-9k7cd\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362151 kubelet[1421]: I0209 18:56:02.362150 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ed73ea14-de39-40f3-8033-40b7fc317b23-varrun\") pod \"csi-node-driver-x8mc9\" (UID: \"ed73ea14-de39-40f3-8033-40b7fc317b23\") " pod="calico-system/csi-node-driver-x8mc9" Feb 9 18:56:02.362255 kubelet[1421]: I0209 18:56:02.362175 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-lib-modules\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362255 kubelet[1421]: I0209 18:56:02.362228 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/75729b98-6a7b-4e76-9b09-167e61c706c1-kube-proxy\") pod \"kube-proxy-62qxc\" (UID: \"75729b98-6a7b-4e76-9b09-167e61c706c1\") " pod="kube-system/kube-proxy-62qxc" Feb 9 18:56:02.362326 kubelet[1421]: I0209 18:56:02.362263 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ed73ea14-de39-40f3-8033-40b7fc317b23-registration-dir\") pod \"csi-node-driver-x8mc9\" (UID: \"ed73ea14-de39-40f3-8033-40b7fc317b23\") " pod="calico-system/csi-node-driver-x8mc9" Feb 9 18:56:02.362326 kubelet[1421]: I0209 18:56:02.362322 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v7rzh\" (UniqueName: \"kubernetes.io/projected/ed73ea14-de39-40f3-8033-40b7fc317b23-kube-api-access-v7rzh\") pod \"csi-node-driver-x8mc9\" (UID: \"ed73ea14-de39-40f3-8033-40b7fc317b23\") " pod="calico-system/csi-node-driver-x8mc9" Feb 9 18:56:02.362417 kubelet[1421]: I0209 18:56:02.362352 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/75729b98-6a7b-4e76-9b09-167e61c706c1-xtables-lock\") pod \"kube-proxy-62qxc\" (UID: \"75729b98-6a7b-4e76-9b09-167e61c706c1\") " pod="kube-system/kube-proxy-62qxc" Feb 9 18:56:02.362417 kubelet[1421]: I0209 18:56:02.362380 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-xtables-lock\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362488 kubelet[1421]: I0209 18:56:02.362420 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/396e5322-c365-4698-abe2-eabb6e7400b6-node-certs\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362488 kubelet[1421]: I0209 18:56:02.362439 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-var-lib-calico\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362488 kubelet[1421]: I0209 18:56:02.362454 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/396e5322-c365-4698-abe2-eabb6e7400b6-cni-log-dir\") pod \"calico-node-8f8nz\" (UID: \"396e5322-c365-4698-abe2-eabb6e7400b6\") " pod="calico-system/calico-node-8f8nz" Feb 9 18:56:02.362591 kubelet[1421]: I0209 18:56:02.362505 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ed73ea14-de39-40f3-8033-40b7fc317b23-socket-dir\") pod \"csi-node-driver-x8mc9\" (UID: \"ed73ea14-de39-40f3-8033-40b7fc317b23\") " pod="calico-system/csi-node-driver-x8mc9" Feb 9 18:56:02.362591 kubelet[1421]: I0209 18:56:02.362534 1421 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:56:02.464109 kubelet[1421]: E0209 18:56:02.464077 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.464109 kubelet[1421]: W0209 18:56:02.464097 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.464274 kubelet[1421]: E0209 18:56:02.464127 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.465694 kubelet[1421]: E0209 18:56:02.465677 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.465694 kubelet[1421]: W0209 18:56:02.465690 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.465769 kubelet[1421]: E0209 18:56:02.465706 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.564122 kubelet[1421]: E0209 18:56:02.564027 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.564122 kubelet[1421]: W0209 18:56:02.564044 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.564122 kubelet[1421]: E0209 18:56:02.564061 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.564302 kubelet[1421]: E0209 18:56:02.564185 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.564302 kubelet[1421]: W0209 18:56:02.564191 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.564302 kubelet[1421]: E0209 18:56:02.564199 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.564467 kubelet[1421]: E0209 18:56:02.564454 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.564467 kubelet[1421]: W0209 18:56:02.564463 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.564537 kubelet[1421]: E0209 18:56:02.564472 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.665067 kubelet[1421]: E0209 18:56:02.665051 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.665067 kubelet[1421]: W0209 18:56:02.665063 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.665195 kubelet[1421]: E0209 18:56:02.665074 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.665293 kubelet[1421]: E0209 18:56:02.665279 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.665293 kubelet[1421]: W0209 18:56:02.665287 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.665350 kubelet[1421]: E0209 18:56:02.665300 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.665455 kubelet[1421]: E0209 18:56:02.665442 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.665455 kubelet[1421]: W0209 18:56:02.665450 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.665455 kubelet[1421]: E0209 18:56:02.665458 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.766087 kubelet[1421]: E0209 18:56:02.766059 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.766087 kubelet[1421]: W0209 18:56:02.766077 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.766087 kubelet[1421]: E0209 18:56:02.766095 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.766307 kubelet[1421]: E0209 18:56:02.766285 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.766307 kubelet[1421]: W0209 18:56:02.766292 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.766307 kubelet[1421]: E0209 18:56:02.766300 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.766473 kubelet[1421]: E0209 18:56:02.766459 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.766473 kubelet[1421]: W0209 18:56:02.766467 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.766473 kubelet[1421]: E0209 18:56:02.766476 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.867184 kubelet[1421]: E0209 18:56:02.867119 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.867184 kubelet[1421]: W0209 18:56:02.867131 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.867184 kubelet[1421]: E0209 18:56:02.867142 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.867301 kubelet[1421]: E0209 18:56:02.867284 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.867301 kubelet[1421]: W0209 18:56:02.867290 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.867301 kubelet[1421]: E0209 18:56:02.867299 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.867505 kubelet[1421]: E0209 18:56:02.867494 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.867589 kubelet[1421]: W0209 18:56:02.867575 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.867675 kubelet[1421]: E0209 18:56:02.867648 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.941692 kubelet[1421]: E0209 18:56:02.941662 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.941692 kubelet[1421]: W0209 18:56:02.941680 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.941692 kubelet[1421]: E0209 18:56:02.941700 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.941877 kubelet[1421]: E0209 18:56:02.941841 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.941877 kubelet[1421]: W0209 18:56:02.941849 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.941877 kubelet[1421]: E0209 18:56:02.941862 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:02.968436 kubelet[1421]: E0209 18:56:02.968417 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:02.968436 kubelet[1421]: W0209 18:56:02.968430 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:02.968513 kubelet[1421]: E0209 18:56:02.968441 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:03.069619 kubelet[1421]: E0209 18:56:03.069593 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:03.069619 kubelet[1421]: W0209 18:56:03.069608 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:03.069619 kubelet[1421]: E0209 18:56:03.069622 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:03.073183 kubelet[1421]: E0209 18:56:03.073154 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:03.073183 kubelet[1421]: W0209 18:56:03.073170 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:03.073183 kubelet[1421]: E0209 18:56:03.073187 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:03.182736 kubelet[1421]: E0209 18:56:03.182649 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:03.183303 env[1114]: time="2024-02-09T18:56:03.183250591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-62qxc,Uid:75729b98-6a7b-4e76-9b09-167e61c706c1,Namespace:kube-system,Attempt:0,}" Feb 9 18:56:03.184452 kubelet[1421]: E0209 18:56:03.184431 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:03.184792 env[1114]: time="2024-02-09T18:56:03.184771463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8f8nz,Uid:396e5322-c365-4698-abe2-eabb6e7400b6,Namespace:calico-system,Attempt:0,}" Feb 9 18:56:03.255015 kubelet[1421]: E0209 18:56:03.254968 1421 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:03.267539 kubelet[1421]: E0209 18:56:03.267510 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:03.795323 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1435455708.mount: Deactivated successfully. Feb 9 18:56:03.802126 env[1114]: time="2024-02-09T18:56:03.802091548Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:03.803703 env[1114]: time="2024-02-09T18:56:03.803649028Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:03.804845 env[1114]: time="2024-02-09T18:56:03.804822769Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:03.808204 env[1114]: time="2024-02-09T18:56:03.808185664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:03.809593 env[1114]: time="2024-02-09T18:56:03.809561193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:03.810865 env[1114]: time="2024-02-09T18:56:03.810836584Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:03.812171 env[1114]: time="2024-02-09T18:56:03.812142473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:03.814911 env[1114]: time="2024-02-09T18:56:03.814878663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:03.833613 env[1114]: time="2024-02-09T18:56:03.833555352Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:03.833613 env[1114]: time="2024-02-09T18:56:03.833587683Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:03.833613 env[1114]: time="2024-02-09T18:56:03.833597942Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:03.833803 env[1114]: time="2024-02-09T18:56:03.833712226Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6bcea527408aff39a8dad145dd4e7e364382de9b73068ba4e5c3bf615117f8cb pid=1544 runtime=io.containerd.runc.v2 Feb 9 18:56:03.834736 env[1114]: time="2024-02-09T18:56:03.834697363Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:03.834783 env[1114]: time="2024-02-09T18:56:03.834745113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:03.834783 env[1114]: time="2024-02-09T18:56:03.834765541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:03.835639 env[1114]: time="2024-02-09T18:56:03.834914911Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb pid=1531 runtime=io.containerd.runc.v2 Feb 9 18:56:03.852714 systemd[1]: Started cri-containerd-0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb.scope. Feb 9 18:56:03.862525 systemd[1]: Started cri-containerd-6bcea527408aff39a8dad145dd4e7e364382de9b73068ba4e5c3bf615117f8cb.scope. Feb 9 18:56:03.882449 kernel: audit: type=1400 audit(1707504963.872:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.882552 kernel: audit: type=1400 audit(1707504963.872:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.882608 kernel: audit: type=1400 audit(1707504963.872:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.882633 kernel: audit: type=1400 audit(1707504963.872:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.882657 kernel: audit: type=1400 audit(1707504963.872:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.886790 kernel: audit: type=1400 audit(1707504963.872:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889195 kernel: audit: type=1400 audit(1707504963.872:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889233 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:56:03.889249 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:56:03.889264 kernel: audit: type=1400 audit(1707504963.872:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit: BPF prog-id=61 op=LOAD Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1544 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636561353237343038616666333961386461643134356464346537 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1544 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636561353237343038616666333961386461643134356464346537 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.877000 audit: BPF prog-id=62 op=LOAD Feb 9 18:56:03.877000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039bb00 items=0 ppid=1544 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636561353237343038616666333961386461643134356464346537 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.879000 audit: BPF prog-id=63 op=LOAD Feb 9 18:56:03.879000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039bb48 items=0 ppid=1544 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636561353237343038616666333961386461643134356464346537 Feb 9 18:56:03.884000 audit: BPF prog-id=63 op=UNLOAD Feb 9 18:56:03.884000 audit: BPF prog-id=62 op=UNLOAD Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.886000 audit: BPF prog-id=64 op=LOAD Feb 9 18:56:03.886000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.886000 audit[1557]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1531 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653532623735363664646533353938353865323735383238336337 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.889000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.884000 audit: BPF prog-id=65 op=LOAD Feb 9 18:56:03.889000 audit: BPF prog-id=66 op=LOAD Feb 9 18:56:03.889000 audit[1557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027b290 items=0 ppid=1531 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653532623735363664646533353938353865323735383238336337 Feb 9 18:56:03.884000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039bf58 items=0 ppid=1544 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662636561353237343038616666333961386461643134356464346537 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit: BPF prog-id=67 op=LOAD Feb 9 18:56:03.892000 audit[1557]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027b2d8 items=0 ppid=1531 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653532623735363664646533353938353865323735383238336337 Feb 9 18:56:03.892000 audit: BPF prog-id=67 op=UNLOAD Feb 9 18:56:03.892000 audit: BPF prog-id=66 op=UNLOAD Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { perfmon } for pid=1557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit[1557]: AVC avc: denied { bpf } for pid=1557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:03.892000 audit: BPF prog-id=68 op=LOAD Feb 9 18:56:03.892000 audit[1557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00027b6e8 items=0 ppid=1531 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:03.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653532623735363664646533353938353865323735383238336337 Feb 9 18:56:03.906457 env[1114]: time="2024-02-09T18:56:03.904961649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-62qxc,Uid:75729b98-6a7b-4e76-9b09-167e61c706c1,Namespace:kube-system,Attempt:0,} returns sandbox id \"6bcea527408aff39a8dad145dd4e7e364382de9b73068ba4e5c3bf615117f8cb\"" Feb 9 18:56:03.907495 kubelet[1421]: E0209 18:56:03.907004 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:03.908237 env[1114]: time="2024-02-09T18:56:03.908205181Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 18:56:03.911373 env[1114]: time="2024-02-09T18:56:03.911343765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8f8nz,Uid:396e5322-c365-4698-abe2-eabb6e7400b6,Namespace:calico-system,Attempt:0,} returns sandbox id \"0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb\"" Feb 9 18:56:03.912032 kubelet[1421]: E0209 18:56:03.911887 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:04.268644 kubelet[1421]: E0209 18:56:04.268542 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:04.396917 kubelet[1421]: E0209 18:56:04.396883 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:04.968334 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1741796868.mount: Deactivated successfully. Feb 9 18:56:05.269077 kubelet[1421]: E0209 18:56:05.268951 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:06.140073 env[1114]: time="2024-02-09T18:56:06.140022778Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:06.269066 kubelet[1421]: E0209 18:56:06.269031 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:06.347616 env[1114]: time="2024-02-09T18:56:06.347568166Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:06.397553 kubelet[1421]: E0209 18:56:06.397442 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:06.459010 env[1114]: time="2024-02-09T18:56:06.458943374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:06.769243 env[1114]: time="2024-02-09T18:56:06.769119654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:06.769676 env[1114]: time="2024-02-09T18:56:06.769652524Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 18:56:06.770260 env[1114]: time="2024-02-09T18:56:06.770229646Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 18:56:06.771338 env[1114]: time="2024-02-09T18:56:06.771303048Z" level=info msg="CreateContainer within sandbox \"6bcea527408aff39a8dad145dd4e7e364382de9b73068ba4e5c3bf615117f8cb\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 18:56:07.270075 kubelet[1421]: E0209 18:56:07.270047 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:07.298775 env[1114]: time="2024-02-09T18:56:07.298697643Z" level=info msg="CreateContainer within sandbox \"6bcea527408aff39a8dad145dd4e7e364382de9b73068ba4e5c3bf615117f8cb\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e9b442d2253e31c0064b49e776394fa1c53de10c73bbb497e9c4736aa276f54d\"" Feb 9 18:56:07.299506 env[1114]: time="2024-02-09T18:56:07.299460293Z" level=info msg="StartContainer for \"e9b442d2253e31c0064b49e776394fa1c53de10c73bbb497e9c4736aa276f54d\"" Feb 9 18:56:07.326245 systemd[1]: Started cri-containerd-e9b442d2253e31c0064b49e776394fa1c53de10c73bbb497e9c4736aa276f54d.scope. Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1544 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623434326432323533653331633030363462343965373736333934 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit: BPF prog-id=69 op=LOAD Feb 9 18:56:07.342000 audit[1611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a6090 items=0 ppid=1544 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623434326432323533653331633030363462343965373736333934 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit: BPF prog-id=70 op=LOAD Feb 9 18:56:07.342000 audit[1611]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a60d8 items=0 ppid=1544 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623434326432323533653331633030363462343965373736333934 Feb 9 18:56:07.342000 audit: BPF prog-id=70 op=UNLOAD Feb 9 18:56:07.342000 audit: BPF prog-id=69 op=UNLOAD Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { perfmon } for pid=1611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit[1611]: AVC avc: denied { bpf } for pid=1611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:07.342000 audit: BPF prog-id=71 op=LOAD Feb 9 18:56:07.342000 audit[1611]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a6168 items=0 ppid=1544 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623434326432323533653331633030363462343965373736333934 Feb 9 18:56:07.400000 audit[1661]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.400000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc74f90b80 a2=0 a3=7ffc74f90b6c items=0 ppid=1621 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:56:07.400000 audit[1662]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.400000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdffe442c0 a2=0 a3=31030 items=0 ppid=1621 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:56:07.402000 audit[1663]: NETFILTER_CFG table=nat:37 family=10 entries=1 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.402000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa6601c00 a2=0 a3=7fffa6601bec items=0 ppid=1621 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:56:07.403000 audit[1664]: NETFILTER_CFG table=filter:38 family=10 entries=1 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.403000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff99e6a210 a2=0 a3=7fff99e6a1fc items=0 ppid=1621 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:56:07.403000 audit[1665]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.403000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0be137a0 a2=0 a3=7fff0be1378c items=0 ppid=1621 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:56:07.404000 audit[1667]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.404000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff24bf6c10 a2=0 a3=7fff24bf6bfc items=0 ppid=1621 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:56:07.455866 env[1114]: time="2024-02-09T18:56:07.455809808Z" level=info msg="StartContainer for \"e9b442d2253e31c0064b49e776394fa1c53de10c73bbb497e9c4736aa276f54d\" returns successfully" Feb 9 18:56:07.506000 audit[1668]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.506000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3e127c90 a2=0 a3=7ffd3e127c7c items=0 ppid=1621 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:56:07.508000 audit[1670]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.508000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc63d51b30 a2=0 a3=7ffc63d51b1c items=0 ppid=1621 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:56:07.510000 audit[1673]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.510000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6fd9cff0 a2=0 a3=7fff6fd9cfdc items=0 ppid=1621 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.510000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:56:07.511000 audit[1674]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.511000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4af00f20 a2=0 a3=7fff4af00f0c items=0 ppid=1621 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:56:07.513000 audit[1676]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.513000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1ee408f0 a2=0 a3=7ffd1ee408dc items=0 ppid=1621 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:56:07.514000 audit[1677]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.514000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee225f010 a2=0 a3=7ffee225effc items=0 ppid=1621 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:56:07.516000 audit[1679]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.516000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff4c79d9c0 a2=0 a3=7fff4c79d9ac items=0 ppid=1621 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:56:07.519000 audit[1682]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.519000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff48e2a440 a2=0 a3=7fff48e2a42c items=0 ppid=1621 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 18:56:07.520000 audit[1683]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.520000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe80c16cf0 a2=0 a3=7ffe80c16cdc items=0 ppid=1621 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:56:07.521000 audit[1685]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.521000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc95eb12a0 a2=0 a3=7ffc95eb128c items=0 ppid=1621 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:56:07.522000 audit[1686]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.522000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdcd47720 a2=0 a3=7fffdcd4770c items=0 ppid=1621 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:56:07.524000 audit[1688]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.524000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde31e7130 a2=0 a3=7ffde31e711c items=0 ppid=1621 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.524000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:56:07.527000 audit[1691]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.527000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc32d74300 a2=0 a3=7ffc32d742ec items=0 ppid=1621 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:56:07.530000 audit[1694]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.530000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8e6cc970 a2=0 a3=7fff8e6cc95c items=0 ppid=1621 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:56:07.530000 audit[1695]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.530000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd6c0e01a0 a2=0 a3=7ffd6c0e018c items=0 ppid=1621 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:56:07.532000 audit[1697]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.532000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffef65844e0 a2=0 a3=7ffef65844cc items=0 ppid=1621 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:56:07.535000 audit[1700]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:56:07.535000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdcf0ad140 a2=0 a3=7ffdcf0ad12c items=0 ppid=1621 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:56:07.543000 audit[1704]: NETFILTER_CFG table=filter:58 family=2 entries=6 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:07.543000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc7fbadb00 a2=0 a3=7ffc7fbadaec items=0 ppid=1621 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.543000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:07.549000 audit[1704]: NETFILTER_CFG table=nat:59 family=2 entries=24 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:07.549000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffc7fbadb00 a2=0 a3=7ffc7fbadaec items=0 ppid=1621 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.549000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:07.551000 audit[1710]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.551000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff782a6c10 a2=0 a3=7fff782a6bfc items=0 ppid=1621 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:56:07.553000 audit[1712]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.553000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd3fbba20 a2=0 a3=7ffcd3fbba0c items=0 ppid=1621 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 18:56:07.556000 audit[1715]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.556000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc52561b90 a2=0 a3=7ffc52561b7c items=0 ppid=1621 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 18:56:07.557000 audit[1716]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.557000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe435a4700 a2=0 a3=7ffe435a46ec items=0 ppid=1621 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:56:07.559000 audit[1718]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.559000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4ae183c0 a2=0 a3=7ffe4ae183ac items=0 ppid=1621 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:56:07.560000 audit[1719]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.560000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc67d71760 a2=0 a3=7ffc67d7174c items=0 ppid=1621 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:56:07.561000 audit[1721]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.561000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc48cecab0 a2=0 a3=7ffc48ceca9c items=0 ppid=1621 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 18:56:07.564000 audit[1724]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.564000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffb7fdf1e0 a2=0 a3=7fffb7fdf1cc items=0 ppid=1621 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:56:07.565000 audit[1725]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.565000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffffd076b0 a2=0 a3=7fffffd0769c items=0 ppid=1621 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:56:07.567000 audit[1727]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.567000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff12977de0 a2=0 a3=7fff12977dcc items=0 ppid=1621 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:56:07.568000 audit[1728]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.568000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7e900670 a2=0 a3=7fff7e90065c items=0 ppid=1621 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:56:07.570000 audit[1730]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.570000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4ec740c0 a2=0 a3=7ffe4ec740ac items=0 ppid=1621 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:56:07.573000 audit[1733]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.573000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff44d178f0 a2=0 a3=7fff44d178dc items=0 ppid=1621 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:56:07.576000 audit[1736]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.576000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4a9c6300 a2=0 a3=7ffe4a9c62ec items=0 ppid=1621 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 18:56:07.577000 audit[1737]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.577000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdae485db0 a2=0 a3=7ffdae485d9c items=0 ppid=1621 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:56:07.579000 audit[1739]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.579000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff31a60d80 a2=0 a3=7fff31a60d6c items=0 ppid=1621 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:56:07.581000 audit[1742]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:56:07.581000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdde02e250 a2=0 a3=7ffdde02e23c items=0 ppid=1621 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:56:07.586000 audit[1746]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:56:07.586000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd71195db0 a2=0 a3=7ffd71195d9c items=0 ppid=1621 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.586000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:07.586000 audit[1746]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:56:07.586000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd71195db0 a2=0 a3=7ffd71195d9c items=0 ppid=1621 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:07.586000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:08.270852 kubelet[1421]: E0209 18:56:08.270787 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:08.397304 kubelet[1421]: E0209 18:56:08.397266 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:08.459457 kubelet[1421]: E0209 18:56:08.459429 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:08.465939 kubelet[1421]: I0209 18:56:08.465915 1421 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-62qxc" podStartSLOduration=-9.223372024388891e+09 pod.CreationTimestamp="2024-02-09 18:55:56 +0000 UTC" firstStartedPulling="2024-02-09 18:56:03.907659157 +0000 UTC m=+20.944343510" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:56:08.46574667 +0000 UTC m=+25.502431023" watchObservedRunningTime="2024-02-09 18:56:08.465884799 +0000 UTC m=+25.502569152" Feb 9 18:56:08.499287 kubelet[1421]: E0209 18:56:08.499258 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.499287 kubelet[1421]: W0209 18:56:08.499275 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.499287 kubelet[1421]: E0209 18:56:08.499292 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.499581 kubelet[1421]: E0209 18:56:08.499568 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.499581 kubelet[1421]: W0209 18:56:08.499577 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.499627 kubelet[1421]: E0209 18:56:08.499586 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.499841 kubelet[1421]: E0209 18:56:08.499824 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.499841 kubelet[1421]: W0209 18:56:08.499838 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.499911 kubelet[1421]: E0209 18:56:08.499849 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.500041 kubelet[1421]: E0209 18:56:08.500022 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.500041 kubelet[1421]: W0209 18:56:08.500032 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.500041 kubelet[1421]: E0209 18:56:08.500041 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.500213 kubelet[1421]: E0209 18:56:08.500202 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.500213 kubelet[1421]: W0209 18:56:08.500211 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.500258 kubelet[1421]: E0209 18:56:08.500219 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.500409 kubelet[1421]: E0209 18:56:08.500381 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.500409 kubelet[1421]: W0209 18:56:08.500401 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.500409 kubelet[1421]: E0209 18:56:08.500410 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.500632 kubelet[1421]: E0209 18:56:08.500611 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.500632 kubelet[1421]: W0209 18:56:08.500627 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.500632 kubelet[1421]: E0209 18:56:08.500637 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.500871 kubelet[1421]: E0209 18:56:08.500842 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.500871 kubelet[1421]: W0209 18:56:08.500866 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.500985 kubelet[1421]: E0209 18:56:08.500891 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.501140 kubelet[1421]: E0209 18:56:08.501119 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.501140 kubelet[1421]: W0209 18:56:08.501132 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.501140 kubelet[1421]: E0209 18:56:08.501142 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.501488 kubelet[1421]: E0209 18:56:08.501475 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.501488 kubelet[1421]: W0209 18:56:08.501484 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.501565 kubelet[1421]: E0209 18:56:08.501494 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.501671 kubelet[1421]: E0209 18:56:08.501658 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.501671 kubelet[1421]: W0209 18:56:08.501667 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.501715 kubelet[1421]: E0209 18:56:08.501674 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.501816 kubelet[1421]: E0209 18:56:08.501802 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.501816 kubelet[1421]: W0209 18:56:08.501811 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.501816 kubelet[1421]: E0209 18:56:08.501818 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.502038 kubelet[1421]: E0209 18:56:08.502019 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.502038 kubelet[1421]: W0209 18:56:08.502028 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.502038 kubelet[1421]: E0209 18:56:08.502036 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.502200 kubelet[1421]: E0209 18:56:08.502187 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.502200 kubelet[1421]: W0209 18:56:08.502197 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.502263 kubelet[1421]: E0209 18:56:08.502206 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.502338 kubelet[1421]: E0209 18:56:08.502323 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.502338 kubelet[1421]: W0209 18:56:08.502331 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.502338 kubelet[1421]: E0209 18:56:08.502339 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.502514 kubelet[1421]: E0209 18:56:08.502502 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.502514 kubelet[1421]: W0209 18:56:08.502510 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.502578 kubelet[1421]: E0209 18:56:08.502518 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.504822 kubelet[1421]: E0209 18:56:08.504790 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.504822 kubelet[1421]: W0209 18:56:08.504813 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.504901 kubelet[1421]: E0209 18:56:08.504835 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.505036 kubelet[1421]: E0209 18:56:08.505017 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.505036 kubelet[1421]: W0209 18:56:08.505027 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.505094 kubelet[1421]: E0209 18:56:08.505042 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.505223 kubelet[1421]: E0209 18:56:08.505207 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.505223 kubelet[1421]: W0209 18:56:08.505217 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.505292 kubelet[1421]: E0209 18:56:08.505233 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.505428 kubelet[1421]: E0209 18:56:08.505408 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.505428 kubelet[1421]: W0209 18:56:08.505425 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.505487 kubelet[1421]: E0209 18:56:08.505439 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.505584 kubelet[1421]: E0209 18:56:08.505572 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.505584 kubelet[1421]: W0209 18:56:08.505580 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.505641 kubelet[1421]: E0209 18:56:08.505592 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.505791 kubelet[1421]: E0209 18:56:08.505775 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.505791 kubelet[1421]: W0209 18:56:08.505784 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.505791 kubelet[1421]: E0209 18:56:08.505796 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.505993 kubelet[1421]: E0209 18:56:08.505972 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.505993 kubelet[1421]: W0209 18:56:08.505986 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.506052 kubelet[1421]: E0209 18:56:08.506002 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.506181 kubelet[1421]: E0209 18:56:08.506169 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.506181 kubelet[1421]: W0209 18:56:08.506179 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.506225 kubelet[1421]: E0209 18:56:08.506192 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.506369 kubelet[1421]: E0209 18:56:08.506357 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.506369 kubelet[1421]: W0209 18:56:08.506367 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.506491 kubelet[1421]: E0209 18:56:08.506376 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.506561 kubelet[1421]: E0209 18:56:08.506548 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.506561 kubelet[1421]: W0209 18:56:08.506557 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.506606 kubelet[1421]: E0209 18:56:08.506565 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.506724 kubelet[1421]: E0209 18:56:08.506713 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.506724 kubelet[1421]: W0209 18:56:08.506722 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.506777 kubelet[1421]: E0209 18:56:08.506730 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.507009 kubelet[1421]: E0209 18:56:08.506986 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:08.507009 kubelet[1421]: W0209 18:56:08.506997 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:08.507009 kubelet[1421]: E0209 18:56:08.507006 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:08.894896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount524305592.mount: Deactivated successfully. Feb 9 18:56:09.271546 kubelet[1421]: E0209 18:56:09.271419 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:09.460542 kubelet[1421]: E0209 18:56:09.460513 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:09.506418 kubelet[1421]: E0209 18:56:09.506401 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.506418 kubelet[1421]: W0209 18:56:09.506414 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.506502 kubelet[1421]: E0209 18:56:09.506429 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.506640 kubelet[1421]: E0209 18:56:09.506626 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.506640 kubelet[1421]: W0209 18:56:09.506633 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.506696 kubelet[1421]: E0209 18:56:09.506641 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.506787 kubelet[1421]: E0209 18:56:09.506776 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.506787 kubelet[1421]: W0209 18:56:09.506784 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.506830 kubelet[1421]: E0209 18:56:09.506791 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.506944 kubelet[1421]: E0209 18:56:09.506932 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.506944 kubelet[1421]: W0209 18:56:09.506939 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.506999 kubelet[1421]: E0209 18:56:09.506947 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.507057 kubelet[1421]: E0209 18:56:09.507047 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.507057 kubelet[1421]: W0209 18:56:09.507053 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.507117 kubelet[1421]: E0209 18:56:09.507062 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.507194 kubelet[1421]: E0209 18:56:09.507184 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.507219 kubelet[1421]: W0209 18:56:09.507195 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.507219 kubelet[1421]: E0209 18:56:09.507207 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.507355 kubelet[1421]: E0209 18:56:09.507345 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.507355 kubelet[1421]: W0209 18:56:09.507352 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.507446 kubelet[1421]: E0209 18:56:09.507359 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.507510 kubelet[1421]: E0209 18:56:09.507502 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.507510 kubelet[1421]: W0209 18:56:09.507508 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.507559 kubelet[1421]: E0209 18:56:09.507517 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.507630 kubelet[1421]: E0209 18:56:09.507621 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.507655 kubelet[1421]: W0209 18:56:09.507630 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.507655 kubelet[1421]: E0209 18:56:09.507640 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.507849 kubelet[1421]: E0209 18:56:09.507840 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.507872 kubelet[1421]: W0209 18:56:09.507850 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.507872 kubelet[1421]: E0209 18:56:09.507862 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.507990 kubelet[1421]: E0209 18:56:09.507980 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.508018 kubelet[1421]: W0209 18:56:09.507990 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.508018 kubelet[1421]: E0209 18:56:09.508000 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.508138 kubelet[1421]: E0209 18:56:09.508128 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.508138 kubelet[1421]: W0209 18:56:09.508135 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.508211 kubelet[1421]: E0209 18:56:09.508143 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.508248 kubelet[1421]: E0209 18:56:09.508241 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.508248 kubelet[1421]: W0209 18:56:09.508247 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.508294 kubelet[1421]: E0209 18:56:09.508254 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.508350 kubelet[1421]: E0209 18:56:09.508343 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.508377 kubelet[1421]: W0209 18:56:09.508349 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.508377 kubelet[1421]: E0209 18:56:09.508356 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.508544 kubelet[1421]: E0209 18:56:09.508536 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.508544 kubelet[1421]: W0209 18:56:09.508543 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.508587 kubelet[1421]: E0209 18:56:09.508551 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.508649 kubelet[1421]: E0209 18:56:09.508643 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.508675 kubelet[1421]: W0209 18:56:09.508649 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.508675 kubelet[1421]: E0209 18:56:09.508656 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.510969 kubelet[1421]: E0209 18:56:09.510943 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.510969 kubelet[1421]: W0209 18:56:09.510960 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.511045 kubelet[1421]: E0209 18:56:09.510973 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.511201 kubelet[1421]: E0209 18:56:09.511185 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.511201 kubelet[1421]: W0209 18:56:09.511196 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.511283 kubelet[1421]: E0209 18:56:09.511212 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.511420 kubelet[1421]: E0209 18:56:09.511409 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.511420 kubelet[1421]: W0209 18:56:09.511420 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.511474 kubelet[1421]: E0209 18:56:09.511436 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.511603 kubelet[1421]: E0209 18:56:09.511589 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.511603 kubelet[1421]: W0209 18:56:09.511599 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.511664 kubelet[1421]: E0209 18:56:09.511615 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.511780 kubelet[1421]: E0209 18:56:09.511763 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.511780 kubelet[1421]: W0209 18:56:09.511773 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.511845 kubelet[1421]: E0209 18:56:09.511789 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.511982 kubelet[1421]: E0209 18:56:09.511967 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.511982 kubelet[1421]: W0209 18:56:09.511978 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.512035 kubelet[1421]: E0209 18:56:09.511992 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.512226 kubelet[1421]: E0209 18:56:09.512211 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.512226 kubelet[1421]: W0209 18:56:09.512223 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.512293 kubelet[1421]: E0209 18:56:09.512239 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.512418 kubelet[1421]: E0209 18:56:09.512408 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.512450 kubelet[1421]: W0209 18:56:09.512418 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.512450 kubelet[1421]: E0209 18:56:09.512434 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.512591 kubelet[1421]: E0209 18:56:09.512579 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.512591 kubelet[1421]: W0209 18:56:09.512589 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.512639 kubelet[1421]: E0209 18:56:09.512604 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.512770 kubelet[1421]: E0209 18:56:09.512759 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.512770 kubelet[1421]: W0209 18:56:09.512766 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.512845 kubelet[1421]: E0209 18:56:09.512780 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.513010 kubelet[1421]: E0209 18:56:09.512995 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.513010 kubelet[1421]: W0209 18:56:09.513006 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.513081 kubelet[1421]: E0209 18:56:09.513022 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.513195 kubelet[1421]: E0209 18:56:09.513182 1421 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:56:09.513195 kubelet[1421]: W0209 18:56:09.513192 1421 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:56:09.513260 kubelet[1421]: E0209 18:56:09.513203 1421 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:56:09.851882 env[1114]: time="2024-02-09T18:56:09.851825187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:09.853513 env[1114]: time="2024-02-09T18:56:09.853476723Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:09.855461 env[1114]: time="2024-02-09T18:56:09.855426790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:09.857417 env[1114]: time="2024-02-09T18:56:09.857371616Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:09.858486 env[1114]: time="2024-02-09T18:56:09.858435621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 18:56:09.860356 env[1114]: time="2024-02-09T18:56:09.860316297Z" level=info msg="CreateContainer within sandbox \"0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:56:09.871055 env[1114]: time="2024-02-09T18:56:09.871003586Z" level=info msg="CreateContainer within sandbox \"0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1416b5302460f9eeedbc77172bccf8bd3e0412a75fefb726667ebddec22b8a91\"" Feb 9 18:56:09.871556 env[1114]: time="2024-02-09T18:56:09.871510456Z" level=info msg="StartContainer for \"1416b5302460f9eeedbc77172bccf8bd3e0412a75fefb726667ebddec22b8a91\"" Feb 9 18:56:09.894836 systemd[1]: Started cri-containerd-1416b5302460f9eeedbc77172bccf8bd3e0412a75fefb726667ebddec22b8a91.scope. Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.941058 kernel: kauditd_printk_skb: 281 callbacks suppressed Feb 9 18:56:09.941131 kernel: audit: type=1400 audit(1707504969.938:648): avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.941157 kernel: audit: type=1300 audit(1707504969.938:648): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1531 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:09.938000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1531 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:09.950407 kernel: audit: type=1327 audit(1707504969.938:648): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313662353330323436306639656565646263373731373262636366 Feb 9 18:56:09.950450 kernel: audit: type=1400 audit(1707504969.938:649): avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.950467 kernel: audit: type=1400 audit(1707504969.938:649): avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313662353330323436306639656565646263373731373262636366 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.952492 kernel: audit: type=1400 audit(1707504969.938:649): avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.952597 kernel: audit: type=1400 audit(1707504969.938:649): avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.954410 kernel: audit: type=1400 audit(1707504969.938:649): avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.958342 kernel: audit: type=1400 audit(1707504969.938:649): avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.961439 kernel: audit: type=1400 audit(1707504969.938:649): avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.938000 audit: BPF prog-id=72 op=LOAD Feb 9 18:56:09.938000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d9be0 items=0 ppid=1531 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:09.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313662353330323436306639656565646263373731373262636366 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.940000 audit: BPF prog-id=73 op=LOAD Feb 9 18:56:09.940000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d9c28 items=0 ppid=1531 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:09.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313662353330323436306639656565646263373731373262636366 Feb 9 18:56:09.946000 audit: BPF prog-id=73 op=UNLOAD Feb 9 18:56:09.946000 audit: BPF prog-id=72 op=UNLOAD Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:09.946000 audit: BPF prog-id=74 op=LOAD Feb 9 18:56:09.946000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d9cb8 items=0 ppid=1531 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:09.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313662353330323436306639656565646263373731373262636366 Feb 9 18:56:09.964996 env[1114]: time="2024-02-09T18:56:09.964951809Z" level=info msg="StartContainer for \"1416b5302460f9eeedbc77172bccf8bd3e0412a75fefb726667ebddec22b8a91\" returns successfully" Feb 9 18:56:09.973287 systemd[1]: cri-containerd-1416b5302460f9eeedbc77172bccf8bd3e0412a75fefb726667ebddec22b8a91.scope: Deactivated successfully. Feb 9 18:56:09.979000 audit: BPF prog-id=74 op=UNLOAD Feb 9 18:56:09.997492 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1416b5302460f9eeedbc77172bccf8bd3e0412a75fefb726667ebddec22b8a91-rootfs.mount: Deactivated successfully. Feb 9 18:56:10.272088 kubelet[1421]: E0209 18:56:10.271980 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:10.397064 kubelet[1421]: E0209 18:56:10.397023 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:10.409782 env[1114]: time="2024-02-09T18:56:10.409735979Z" level=info msg="shim disconnected" id=1416b5302460f9eeedbc77172bccf8bd3e0412a75fefb726667ebddec22b8a91 Feb 9 18:56:10.409782 env[1114]: time="2024-02-09T18:56:10.409781084Z" level=warning msg="cleaning up after shim disconnected" id=1416b5302460f9eeedbc77172bccf8bd3e0412a75fefb726667ebddec22b8a91 namespace=k8s.io Feb 9 18:56:10.409928 env[1114]: time="2024-02-09T18:56:10.409790642Z" level=info msg="cleaning up dead shim" Feb 9 18:56:10.415874 env[1114]: time="2024-02-09T18:56:10.415827150Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:56:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1849 runtime=io.containerd.runc.v2\n" Feb 9 18:56:10.463082 kubelet[1421]: E0209 18:56:10.463044 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:10.463708 env[1114]: time="2024-02-09T18:56:10.463679273Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 18:56:11.272999 kubelet[1421]: E0209 18:56:11.272945 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:12.274088 kubelet[1421]: E0209 18:56:12.274045 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:12.397019 kubelet[1421]: E0209 18:56:12.396977 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:12.924327 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount66538956.mount: Deactivated successfully. Feb 9 18:56:13.274602 kubelet[1421]: E0209 18:56:13.274501 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:14.275593 kubelet[1421]: E0209 18:56:14.275544 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:14.397086 kubelet[1421]: E0209 18:56:14.397039 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:15.276504 kubelet[1421]: E0209 18:56:15.276460 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:16.277263 kubelet[1421]: E0209 18:56:16.277221 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:16.396673 kubelet[1421]: E0209 18:56:16.396639 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:17.277747 kubelet[1421]: E0209 18:56:17.277686 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:17.646655 env[1114]: time="2024-02-09T18:56:17.646541546Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:17.649440 env[1114]: time="2024-02-09T18:56:17.649376933Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:17.651277 env[1114]: time="2024-02-09T18:56:17.651249685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:17.653329 env[1114]: time="2024-02-09T18:56:17.653301580Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:17.653951 env[1114]: time="2024-02-09T18:56:17.653919013Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 18:56:17.655482 env[1114]: time="2024-02-09T18:56:17.655454127Z" level=info msg="CreateContainer within sandbox \"0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 18:56:17.667521 env[1114]: time="2024-02-09T18:56:17.667483204Z" level=info msg="CreateContainer within sandbox \"0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9fb6eef4fb04fb6ea9b13d7f1fb0eb8fb6e19ba96d32ac12c2e09c4c61fa07c2\"" Feb 9 18:56:17.667876 env[1114]: time="2024-02-09T18:56:17.667855388Z" level=info msg="StartContainer for \"9fb6eef4fb04fb6ea9b13d7f1fb0eb8fb6e19ba96d32ac12c2e09c4c61fa07c2\"" Feb 9 18:56:17.802553 systemd[1]: Started cri-containerd-9fb6eef4fb04fb6ea9b13d7f1fb0eb8fb6e19ba96d32ac12c2e09c4c61fa07c2.scope. Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.829677 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 18:56:17.829748 kernel: audit: type=1400 audit(1707504977.828:655): avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1531 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:17.834756 kernel: audit: type=1300 audit(1707504977.828:655): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1531 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:17.834816 kernel: audit: type=1327 audit(1707504977.828:655): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623665656634666230346662366561396231336437663166623065 Feb 9 18:56:17.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623665656634666230346662366561396231336437663166623065 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.839604 kernel: audit: type=1400 audit(1707504977.828:656): avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.839657 kernel: audit: type=1400 audit(1707504977.828:656): avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.841767 kernel: audit: type=1400 audit(1707504977.828:656): avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.844083 kernel: audit: type=1400 audit(1707504977.828:656): avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.852372 kernel: audit: type=1400 audit(1707504977.828:656): avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.852464 kernel: audit: type=1400 audit(1707504977.828:656): avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.852487 kernel: audit: type=1400 audit(1707504977.828:656): avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.828000 audit: BPF prog-id=75 op=LOAD Feb 9 18:56:17.828000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000396f90 items=0 ppid=1531 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:17.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623665656634666230346662366561396231336437663166623065 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.831000 audit: BPF prog-id=76 op=LOAD Feb 9 18:56:17.831000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000396fd8 items=0 ppid=1531 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:17.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623665656634666230346662366561396231336437663166623065 Feb 9 18:56:17.837000 audit: BPF prog-id=76 op=UNLOAD Feb 9 18:56:17.837000 audit: BPF prog-id=75 op=UNLOAD Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:17.837000 audit: BPF prog-id=77 op=LOAD Feb 9 18:56:17.837000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000397068 items=0 ppid=1531 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:17.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623665656634666230346662366561396231336437663166623065 Feb 9 18:56:17.865544 env[1114]: time="2024-02-09T18:56:17.865485636Z" level=info msg="StartContainer for \"9fb6eef4fb04fb6ea9b13d7f1fb0eb8fb6e19ba96d32ac12c2e09c4c61fa07c2\" returns successfully" Feb 9 18:56:18.278912 kubelet[1421]: E0209 18:56:18.278822 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:18.396717 kubelet[1421]: E0209 18:56:18.396669 1421 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:18.474745 kubelet[1421]: E0209 18:56:18.474706 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:18.933000 audit[1926]: NETFILTER_CFG table=filter:79 family=2 entries=12 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:18.933000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffeb438b8e0 a2=0 a3=7ffeb438b8cc items=0 ppid=1621 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:18.934000 audit[1926]: NETFILTER_CFG table=nat:80 family=2 entries=30 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:18.934000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffeb438b8e0 a2=0 a3=7ffeb438b8cc items=0 ppid=1621 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:18.985000 audit[1952]: NETFILTER_CFG table=filter:81 family=2 entries=9 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:18.985000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdda7f0a00 a2=0 a3=7ffdda7f09ec items=0 ppid=1621 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:18.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:19.015000 audit[1952]: NETFILTER_CFG table=nat:82 family=2 entries=51 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:19.015000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffdda7f0a00 a2=0 a3=7ffdda7f09ec items=0 ppid=1621 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:19.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:19.279082 kubelet[1421]: E0209 18:56:19.278963 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:19.476576 kubelet[1421]: E0209 18:56:19.476548 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:20.008024 systemd[1]: cri-containerd-9fb6eef4fb04fb6ea9b13d7f1fb0eb8fb6e19ba96d32ac12c2e09c4c61fa07c2.scope: Deactivated successfully. Feb 9 18:56:20.012000 audit: BPF prog-id=77 op=UNLOAD Feb 9 18:56:20.024334 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9fb6eef4fb04fb6ea9b13d7f1fb0eb8fb6e19ba96d32ac12c2e09c4c61fa07c2-rootfs.mount: Deactivated successfully. Feb 9 18:56:20.042164 kubelet[1421]: I0209 18:56:20.042135 1421 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 18:56:20.279329 kubelet[1421]: E0209 18:56:20.279142 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:20.400414 systemd[1]: Created slice kubepods-besteffort-poded73ea14_de39_40f3_8033_40b7fc317b23.slice. Feb 9 18:56:20.401980 env[1114]: time="2024-02-09T18:56:20.401931093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x8mc9,Uid:ed73ea14-de39-40f3-8033-40b7fc317b23,Namespace:calico-system,Attempt:0,}" Feb 9 18:56:20.907000 audit[2001]: NETFILTER_CFG table=filter:83 family=2 entries=6 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:20.907000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffd3bc20b0 a2=0 a3=7fffd3bc209c items=0 ppid=1621 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:20.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:20.908000 audit[2001]: NETFILTER_CFG table=nat:84 family=2 entries=60 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:20.908000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7fffd3bc20b0 a2=0 a3=7fffd3bc209c items=0 ppid=1621 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:20.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:21.279857 kubelet[1421]: E0209 18:56:21.279733 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:21.506563 env[1114]: time="2024-02-09T18:56:21.506515248Z" level=info msg="shim disconnected" id=9fb6eef4fb04fb6ea9b13d7f1fb0eb8fb6e19ba96d32ac12c2e09c4c61fa07c2 Feb 9 18:56:21.506563 env[1114]: time="2024-02-09T18:56:21.506558160Z" level=warning msg="cleaning up after shim disconnected" id=9fb6eef4fb04fb6ea9b13d7f1fb0eb8fb6e19ba96d32ac12c2e09c4c61fa07c2 namespace=k8s.io Feb 9 18:56:21.506563 env[1114]: time="2024-02-09T18:56:21.506567377Z" level=info msg="cleaning up dead shim" Feb 9 18:56:21.512897 env[1114]: time="2024-02-09T18:56:21.512848350Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:56:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2002 runtime=io.containerd.runc.v2\n" Feb 9 18:56:21.632432 env[1114]: time="2024-02-09T18:56:21.632281244Z" level=error msg="Failed to destroy network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:21.632722 env[1114]: time="2024-02-09T18:56:21.632679143Z" level=error msg="encountered an error cleaning up failed sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:21.632866 env[1114]: time="2024-02-09T18:56:21.632733917Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x8mc9,Uid:ed73ea14-de39-40f3-8033-40b7fc317b23,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:21.633075 kubelet[1421]: E0209 18:56:21.633049 1421 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:21.633156 kubelet[1421]: E0209 18:56:21.633119 1421 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x8mc9" Feb 9 18:56:21.633156 kubelet[1421]: E0209 18:56:21.633143 1421 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-x8mc9" Feb 9 18:56:21.633222 kubelet[1421]: E0209 18:56:21.633205 1421 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-x8mc9_calico-system(ed73ea14-de39-40f3-8033-40b7fc317b23)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-x8mc9_calico-system(ed73ea14-de39-40f3-8033-40b7fc317b23)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:21.633570 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62-shm.mount: Deactivated successfully. Feb 9 18:56:22.113000 audit[2075]: NETFILTER_CFG table=filter:85 family=2 entries=6 op=nft_register_rule pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:22.113000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc19906310 a2=0 a3=7ffc199062fc items=0 ppid=1621 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:22.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:22.117000 audit[2075]: NETFILTER_CFG table=nat:86 family=2 entries=72 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:22.117000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc19906310 a2=0 a3=7ffc199062fc items=0 ppid=1621 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:22.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:22.280206 kubelet[1421]: E0209 18:56:22.280141 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:22.482616 kubelet[1421]: E0209 18:56:22.482502 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:22.483249 env[1114]: time="2024-02-09T18:56:22.483218164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 18:56:22.483399 kubelet[1421]: I0209 18:56:22.483369 1421 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:22.483911 env[1114]: time="2024-02-09T18:56:22.483884323Z" level=info msg="StopPodSandbox for \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\"" Feb 9 18:56:22.522931 env[1114]: time="2024-02-09T18:56:22.522845036Z" level=error msg="StopPodSandbox for \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\" failed" error="failed to destroy network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:22.523299 kubelet[1421]: E0209 18:56:22.523108 1421 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:22.523299 kubelet[1421]: E0209 18:56:22.523161 1421 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62} Feb 9 18:56:22.523299 kubelet[1421]: E0209 18:56:22.523206 1421 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed73ea14-de39-40f3-8033-40b7fc317b23\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:56:22.523299 kubelet[1421]: E0209 18:56:22.523237 1421 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed73ea14-de39-40f3-8033-40b7fc317b23\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-x8mc9" podUID=ed73ea14-de39-40f3-8033-40b7fc317b23 Feb 9 18:56:23.255256 kubelet[1421]: E0209 18:56:23.255200 1421 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:23.280394 kubelet[1421]: E0209 18:56:23.280326 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:24.280784 kubelet[1421]: E0209 18:56:24.280736 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:24.487344 kubelet[1421]: I0209 18:56:24.487300 1421 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:56:24.492249 systemd[1]: Created slice kubepods-besteffort-pod179a0837_9f75_41e3_b391_c4ebe7724b29.slice. Feb 9 18:56:24.642734 kubelet[1421]: I0209 18:56:24.642601 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qkdqg\" (UniqueName: \"kubernetes.io/projected/179a0837-9f75-41e3-b391-c4ebe7724b29-kube-api-access-qkdqg\") pod \"nginx-deployment-8ffc5cf85-t5fwn\" (UID: \"179a0837-9f75-41e3-b391-c4ebe7724b29\") " pod="default/nginx-deployment-8ffc5cf85-t5fwn" Feb 9 18:56:24.795208 env[1114]: time="2024-02-09T18:56:24.795156255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-t5fwn,Uid:179a0837-9f75-41e3-b391-c4ebe7724b29,Namespace:default,Attempt:0,}" Feb 9 18:56:24.926156 env[1114]: time="2024-02-09T18:56:24.926003920Z" level=error msg="Failed to destroy network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:24.926379 env[1114]: time="2024-02-09T18:56:24.926342754Z" level=error msg="encountered an error cleaning up failed sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:24.926379 env[1114]: time="2024-02-09T18:56:24.926400394Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-t5fwn,Uid:179a0837-9f75-41e3-b391-c4ebe7724b29,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:24.926653 kubelet[1421]: E0209 18:56:24.926624 1421 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:24.926729 kubelet[1421]: E0209 18:56:24.926680 1421 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-t5fwn" Feb 9 18:56:24.926729 kubelet[1421]: E0209 18:56:24.926700 1421 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-t5fwn" Feb 9 18:56:24.926802 kubelet[1421]: E0209 18:56:24.926751 1421 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-t5fwn_default(179a0837-9f75-41e3-b391-c4ebe7724b29)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-t5fwn_default(179a0837-9f75-41e3-b391-c4ebe7724b29)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-t5fwn" podUID=179a0837-9f75-41e3-b391-c4ebe7724b29 Feb 9 18:56:24.927273 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12-shm.mount: Deactivated successfully. Feb 9 18:56:25.074611 update_engine[1105]: I0209 18:56:25.074524 1105 update_attempter.cc:509] Updating boot flags... Feb 9 18:56:25.281609 kubelet[1421]: E0209 18:56:25.281459 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:25.489058 kubelet[1421]: I0209 18:56:25.489024 1421 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:25.489528 env[1114]: time="2024-02-09T18:56:25.489496088Z" level=info msg="StopPodSandbox for \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\"" Feb 9 18:56:25.575691 env[1114]: time="2024-02-09T18:56:25.575555154Z" level=error msg="StopPodSandbox for \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\" failed" error="failed to destroy network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:56:25.575922 kubelet[1421]: E0209 18:56:25.575897 1421 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:25.576008 kubelet[1421]: E0209 18:56:25.575949 1421 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12} Feb 9 18:56:25.576008 kubelet[1421]: E0209 18:56:25.575995 1421 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"179a0837-9f75-41e3-b391-c4ebe7724b29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:56:25.576194 kubelet[1421]: E0209 18:56:25.576034 1421 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"179a0837-9f75-41e3-b391-c4ebe7724b29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-t5fwn" podUID=179a0837-9f75-41e3-b391-c4ebe7724b29 Feb 9 18:56:26.282554 kubelet[1421]: E0209 18:56:26.282500 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:27.283003 kubelet[1421]: E0209 18:56:27.282937 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:28.284143 kubelet[1421]: E0209 18:56:28.284089 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:29.284525 kubelet[1421]: E0209 18:56:29.284468 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:30.285607 kubelet[1421]: E0209 18:56:30.285532 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:30.927504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4137201458.mount: Deactivated successfully. Feb 9 18:56:31.286809 kubelet[1421]: E0209 18:56:31.286651 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:32.287247 kubelet[1421]: E0209 18:56:32.287205 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:32.860497 env[1114]: time="2024-02-09T18:56:32.860432133Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:32.862150 env[1114]: time="2024-02-09T18:56:32.862120025Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:32.863629 env[1114]: time="2024-02-09T18:56:32.863601727Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:32.864815 env[1114]: time="2024-02-09T18:56:32.864788091Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:32.865211 env[1114]: time="2024-02-09T18:56:32.865181164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 18:56:32.874799 env[1114]: time="2024-02-09T18:56:32.874755421Z" level=info msg="CreateContainer within sandbox \"0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 18:56:32.889064 env[1114]: time="2024-02-09T18:56:32.889001162Z" level=info msg="CreateContainer within sandbox \"0de52b7566dde359858e2758283c74e459b0e25bf20c826f475000efc22c66cb\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1bc3671ff013f160af2399f6ddf1d1fccc10cf231e51dbaa0102d625e935b57c\"" Feb 9 18:56:32.889551 env[1114]: time="2024-02-09T18:56:32.889522778Z" level=info msg="StartContainer for \"1bc3671ff013f160af2399f6ddf1d1fccc10cf231e51dbaa0102d625e935b57c\"" Feb 9 18:56:33.003661 systemd[1]: Started cri-containerd-1bc3671ff013f160af2399f6ddf1d1fccc10cf231e51dbaa0102d625e935b57c.scope. Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.043430 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 9 18:56:33.043585 kernel: audit: type=1400 audit(1707504993.033:670): avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.043620 kernel: audit: type=1300 audit(1707504993.033:670): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1531 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:33.043639 kernel: audit: type=1327 audit(1707504993.033:670): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633336373166663031336631363061663233393966366464663164 Feb 9 18:56:33.033000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1531 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:33.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633336373166663031336631363061663233393966366464663164 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.046655 kernel: audit: type=1400 audit(1707504993.033:671): avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.046712 kernel: audit: type=1400 audit(1707504993.033:671): avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.050582 kernel: audit: type=1400 audit(1707504993.033:671): avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.050624 kernel: audit: type=1400 audit(1707504993.033:671): avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.054647 kernel: audit: type=1400 audit(1707504993.033:671): avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.056707 kernel: audit: type=1400 audit(1707504993.033:671): avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.056804 kernel: audit: type=1400 audit(1707504993.033:671): avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.033000 audit: BPF prog-id=78 op=LOAD Feb 9 18:56:33.033000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d6110 items=0 ppid=1531 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:33.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633336373166663031336631363061663233393966366464663164 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.039000 audit: BPF prog-id=79 op=LOAD Feb 9 18:56:33.039000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d6158 items=0 ppid=1531 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:33.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633336373166663031336631363061663233393966366464663164 Feb 9 18:56:33.042000 audit: BPF prog-id=79 op=UNLOAD Feb 9 18:56:33.042000 audit: BPF prog-id=78 op=UNLOAD Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { perfmon } for pid=2187 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit[2187]: AVC avc: denied { bpf } for pid=2187 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:33.042000 audit: BPF prog-id=80 op=LOAD Feb 9 18:56:33.042000 audit[2187]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d61e8 items=0 ppid=1531 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:33.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162633336373166663031336631363061663233393966366464663164 Feb 9 18:56:33.066820 env[1114]: time="2024-02-09T18:56:33.066763413Z" level=info msg="StartContainer for \"1bc3671ff013f160af2399f6ddf1d1fccc10cf231e51dbaa0102d625e935b57c\" returns successfully" Feb 9 18:56:33.141672 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 18:56:33.141817 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 18:56:33.288816 kubelet[1421]: E0209 18:56:33.288775 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:33.535232 kubelet[1421]: E0209 18:56:33.535116 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:33.610987 kubelet[1421]: I0209 18:56:33.610948 1421 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-8f8nz" podStartSLOduration=-9.22337199924387e+09 pod.CreationTimestamp="2024-02-09 18:55:56 +0000 UTC" firstStartedPulling="2024-02-09 18:56:03.912203357 +0000 UTC m=+20.948887710" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:56:33.610482736 +0000 UTC m=+50.647167089" watchObservedRunningTime="2024-02-09 18:56:33.610906006 +0000 UTC m=+50.647590369" Feb 9 18:56:34.289483 kubelet[1421]: E0209 18:56:34.289401 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:34.536699 kubelet[1421]: E0209 18:56:34.536671 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:34.923000 audit[2344]: AVC avc: denied { write } for pid=2344 comm="tee" name="fd" dev="proc" ino=21326 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:34.923000 audit[2344]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff93a6298b a2=241 a3=1b6 items=1 ppid=2307 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:34.923000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 18:56:34.923000 audit: PATH item=0 name="/dev/fd/63" inode=21321 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:34.923000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:34.929000 audit[2359]: AVC avc: denied { write } for pid=2359 comm="tee" name="fd" dev="proc" ino=21642 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:34.929000 audit[2359]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcef19798c a2=241 a3=1b6 items=1 ppid=2302 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:34.929000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 18:56:34.929000 audit: PATH item=0 name="/dev/fd/63" inode=21639 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:34.929000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:34.940000 audit[2371]: AVC avc: denied { write } for pid=2371 comm="tee" name="fd" dev="proc" ino=21336 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:34.940000 audit[2371]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed56de98b a2=241 a3=1b6 items=1 ppid=2315 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:34.940000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 18:56:34.940000 audit: PATH item=0 name="/dev/fd/63" inode=21333 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:34.940000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:34.940000 audit[2347]: AVC avc: denied { write } for pid=2347 comm="tee" name="fd" dev="proc" ino=20009 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:34.940000 audit[2347]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbdf2d98b a2=241 a3=1b6 items=1 ppid=2303 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:34.940000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 18:56:34.940000 audit: PATH item=0 name="/dev/fd/63" inode=21632 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:34.940000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:34.965000 audit[2369]: AVC avc: denied { write } for pid=2369 comm="tee" name="fd" dev="proc" ino=21649 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:34.965000 audit[2369]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1e56997b a2=241 a3=1b6 items=1 ppid=2308 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:34.965000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 18:56:34.965000 audit: PATH item=0 name="/dev/fd/63" inode=19165 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:34.965000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:34.977000 audit[2374]: AVC avc: denied { write } for pid=2374 comm="tee" name="fd" dev="proc" ino=20016 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:34.977000 audit[2374]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe443f997c a2=241 a3=1b6 items=1 ppid=2300 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:34.977000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 18:56:34.977000 audit: PATH item=0 name="/dev/fd/63" inode=20006 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:34.977000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:34.998000 audit[2379]: AVC avc: denied { write } for pid=2379 comm="tee" name="fd" dev="proc" ino=19168 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:56:34.998000 audit[2379]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe91d3998d a2=241 a3=1b6 items=1 ppid=2313 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:34.998000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 18:56:34.998000 audit: PATH item=0 name="/dev/fd/63" inode=20013 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:34.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:56:35.088417 kernel: Initializing XFRM netlink socket Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.174000 audit: BPF prog-id=81 op=LOAD Feb 9 18:56:35.174000 audit[2450]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef7c30100 a2=70 a3=7fabd3f19000 items=0 ppid=2304 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:35.175000 audit: BPF prog-id=81 op=UNLOAD Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit: BPF prog-id=82 op=LOAD Feb 9 18:56:35.175000 audit[2450]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef7c30100 a2=70 a3=6e items=0 ppid=2304 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:35.175000 audit: BPF prog-id=82 op=UNLOAD Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef7c300b0 a2=70 a3=7ffef7c30100 items=0 ppid=2304 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit: BPF prog-id=83 op=LOAD Feb 9 18:56:35.175000 audit[2450]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffef7c30090 a2=70 a3=7ffef7c30100 items=0 ppid=2304 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:35.175000 audit: BPF prog-id=83 op=UNLOAD Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef7c30170 a2=70 a3=0 items=0 ppid=2304 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef7c30160 a2=70 a3=0 items=0 ppid=2304 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:35.175000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.175000 audit[2450]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffef7c301a0 a2=70 a3=0 items=0 ppid=2304 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.175000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { perfmon } for pid=2450 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit[2450]: AVC avc: denied { bpf } for pid=2450 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.176000 audit: BPF prog-id=84 op=LOAD Feb 9 18:56:35.176000 audit[2450]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffef7c300c0 a2=70 a3=ffffffff items=0 ppid=2304 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.176000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:56:35.181000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.181000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff305dce50 a2=70 a3=208 items=0 ppid=2304 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:56:35.181000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:35.181000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff305dcd20 a2=70 a3=3 items=0 ppid=2304 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.181000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:56:35.189000 audit: BPF prog-id=84 op=UNLOAD Feb 9 18:56:35.226000 audit[2477]: NETFILTER_CFG table=raw:87 family=2 entries=19 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:35.226000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff0ab83860 a2=0 a3=7fff0ab8384c items=0 ppid=2304 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.226000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:35.229000 audit[2481]: NETFILTER_CFG table=mangle:88 family=2 entries=19 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:35.229000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdb86e7f00 a2=0 a3=7ffdb86e7eec items=0 ppid=2304 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:35.231000 audit[2479]: NETFILTER_CFG table=nat:89 family=2 entries=16 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:35.231000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffcadef8730 a2=0 a3=55ced4299000 items=0 ppid=2304 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.231000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:35.231000 audit[2480]: NETFILTER_CFG table=filter:90 family=2 entries=39 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:35.231000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff29b50b00 a2=0 a3=5651a7332000 items=0 ppid=2304 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:35.231000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:35.290312 kubelet[1421]: E0209 18:56:35.290269 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:36.124997 systemd-networkd[1014]: vxlan.calico: Link UP Feb 9 18:56:36.125004 systemd-networkd[1014]: vxlan.calico: Gained carrier Feb 9 18:56:36.290810 kubelet[1421]: E0209 18:56:36.290769 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:36.398551 env[1114]: time="2024-02-09T18:56:36.398374203Z" level=info msg="StopPodSandbox for \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\"" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.539 [INFO][2506] k8s.go 578: Cleaning up netns ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.539 [INFO][2506] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" iface="eth0" netns="/var/run/netns/cni-d3828734-a8a5-af56-862a-9b163eb3cc11" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.540 [INFO][2506] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" iface="eth0" netns="/var/run/netns/cni-d3828734-a8a5-af56-862a-9b163eb3cc11" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.540 [INFO][2506] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" iface="eth0" netns="/var/run/netns/cni-d3828734-a8a5-af56-862a-9b163eb3cc11" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.540 [INFO][2506] k8s.go 585: Releasing IP address(es) ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.540 [INFO][2506] utils.go 188: Calico CNI releasing IP address ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.580 [INFO][2514] ipam_plugin.go 415: Releasing address using handleID ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.580 [INFO][2514] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.581 [INFO][2514] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.596 [WARNING][2514] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.596 [INFO][2514] ipam_plugin.go 443: Releasing address using workloadID ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.598 [INFO][2514] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:36.599858 env[1114]: 2024-02-09 18:56:36.598 [INFO][2506] k8s.go 591: Teardown processing complete. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:36.600487 env[1114]: time="2024-02-09T18:56:36.600027882Z" level=info msg="TearDown network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\" successfully" Feb 9 18:56:36.600487 env[1114]: time="2024-02-09T18:56:36.600069551Z" level=info msg="StopPodSandbox for \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\" returns successfully" Feb 9 18:56:36.600896 env[1114]: time="2024-02-09T18:56:36.600869641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x8mc9,Uid:ed73ea14-de39-40f3-8033-40b7fc317b23,Namespace:calico-system,Attempt:1,}" Feb 9 18:56:36.601631 systemd[1]: run-netns-cni\x2dd3828734\x2da8a5\x2daf56\x2d862a\x2d9b163eb3cc11.mount: Deactivated successfully. Feb 9 18:56:37.145593 systemd-networkd[1014]: vxlan.calico: Gained IPv6LL Feb 9 18:56:37.291507 kubelet[1421]: E0209 18:56:37.291460 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:37.322216 systemd-networkd[1014]: cali14710870acb: Link UP Feb 9 18:56:37.323860 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:56:37.323980 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14710870acb: link becomes ready Feb 9 18:56:37.324144 systemd-networkd[1014]: cali14710870acb: Gained carrier Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.244 [INFO][2523] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-csi--node--driver--x8mc9-eth0 csi-node-driver- calico-system ed73ea14-de39-40f3-8033-40b7fc317b23 970 0 2024-02-09 18:55:56 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.90 csi-node-driver-x8mc9 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali14710870acb [] []}} ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Namespace="calico-system" Pod="csi-node-driver-x8mc9" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--x8mc9-" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.244 [INFO][2523] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Namespace="calico-system" Pod="csi-node-driver-x8mc9" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.287 [INFO][2537] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" HandleID="k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.299 [INFO][2537] ipam_plugin.go 268: Auto assigning IP ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" HandleID="k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000341c30), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.90", "pod":"csi-node-driver-x8mc9", "timestamp":"2024-02-09 18:56:37.287532534 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.299 [INFO][2537] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.299 [INFO][2537] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.299 [INFO][2537] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.301 [INFO][2537] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.304 [INFO][2537] ipam.go 372: Looking up existing affinities for host host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.307 [INFO][2537] ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.308 [INFO][2537] ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.310 [INFO][2537] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.310 [INFO][2537] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.311 [INFO][2537] ipam.go 1682: Creating new handle: k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9 Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.314 [INFO][2537] ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.317 [INFO][2537] ipam.go 1216: Successfully claimed IPs: [192.168.37.65/26] block=192.168.37.64/26 handle="k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.317 [INFO][2537] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.65/26] handle="k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" host="10.0.0.90" Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.317 [INFO][2537] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:37.333524 env[1114]: 2024-02-09 18:56:37.317 [INFO][2537] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.37.65/26] IPv6=[] ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" HandleID="k8s-pod-network.94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:37.334310 env[1114]: 2024-02-09 18:56:37.320 [INFO][2523] k8s.go 385: Populated endpoint ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Namespace="calico-system" Pod="csi-node-driver-x8mc9" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-csi--node--driver--x8mc9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ed73ea14-de39-40f3-8033-40b7fc317b23", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"csi-node-driver-x8mc9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14710870acb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:37.334310 env[1114]: 2024-02-09 18:56:37.320 [INFO][2523] k8s.go 386: Calico CNI using IPs: [192.168.37.65/32] ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Namespace="calico-system" Pod="csi-node-driver-x8mc9" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:37.334310 env[1114]: 2024-02-09 18:56:37.320 [INFO][2523] dataplane_linux.go 68: Setting the host side veth name to cali14710870acb ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Namespace="calico-system" Pod="csi-node-driver-x8mc9" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:37.334310 env[1114]: 2024-02-09 18:56:37.323 [INFO][2523] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Namespace="calico-system" Pod="csi-node-driver-x8mc9" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:37.334310 env[1114]: 2024-02-09 18:56:37.324 [INFO][2523] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Namespace="calico-system" Pod="csi-node-driver-x8mc9" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-csi--node--driver--x8mc9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ed73ea14-de39-40f3-8033-40b7fc317b23", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9", Pod:"csi-node-driver-x8mc9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14710870acb", MAC:"b6:63:23:a4:2e:54", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:37.334310 env[1114]: 2024-02-09 18:56:37.332 [INFO][2523] k8s.go 491: Wrote updated endpoint to datastore ContainerID="94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9" Namespace="calico-system" Pod="csi-node-driver-x8mc9" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:37.345000 audit[2563]: NETFILTER_CFG table=filter:91 family=2 entries=36 op=nft_register_chain pid=2563 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:37.345000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffca94bca20 a2=0 a3=7ffca94bca0c items=0 ppid=2304 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.345000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:37.350231 env[1114]: time="2024-02-09T18:56:37.350159161Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:37.350231 env[1114]: time="2024-02-09T18:56:37.350202363Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:37.350231 env[1114]: time="2024-02-09T18:56:37.350213104Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:37.350438 env[1114]: time="2024-02-09T18:56:37.350373406Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9 pid=2567 runtime=io.containerd.runc.v2 Feb 9 18:56:37.364699 systemd[1]: Started cri-containerd-94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9.scope. Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit: BPF prog-id=85 op=LOAD Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934616433633563643562396161616235336137343134373961373639 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934616433633563643562396161616235336137343134373961373639 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit: BPF prog-id=86 op=LOAD Feb 9 18:56:37.418000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00037a720 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934616433633563643562396161616235336137343134373961373639 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.418000 audit: BPF prog-id=87 op=LOAD Feb 9 18:56:37.418000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00037a768 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934616433633563643562396161616235336137343134373961373639 Feb 9 18:56:37.418000 audit: BPF prog-id=87 op=UNLOAD Feb 9 18:56:37.419000 audit: BPF prog-id=86 op=UNLOAD Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { perfmon } for pid=2577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit[2577]: AVC avc: denied { bpf } for pid=2577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:37.419000 audit: BPF prog-id=88 op=LOAD Feb 9 18:56:37.419000 audit[2577]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037ab78 items=0 ppid=2567 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:37.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934616433633563643562396161616235336137343134373961373639 Feb 9 18:56:37.421382 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:56:37.430612 env[1114]: time="2024-02-09T18:56:37.430553793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-x8mc9,Uid:ed73ea14-de39-40f3-8033-40b7fc317b23,Namespace:calico-system,Attempt:1,} returns sandbox id \"94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9\"" Feb 9 18:56:37.432503 env[1114]: time="2024-02-09T18:56:37.432468245Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 18:56:38.292554 kubelet[1421]: E0209 18:56:38.292512 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:38.397315 env[1114]: time="2024-02-09T18:56:38.397270312Z" level=info msg="StopPodSandbox for \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\"" Feb 9 18:56:38.490093 systemd-networkd[1014]: cali14710870acb: Gained IPv6LL Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.530 [INFO][2617] k8s.go 578: Cleaning up netns ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.530 [INFO][2617] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" iface="eth0" netns="/var/run/netns/cni-42e100c3-e56d-ead1-49c1-43ca10c64fe1" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.531 [INFO][2617] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" iface="eth0" netns="/var/run/netns/cni-42e100c3-e56d-ead1-49c1-43ca10c64fe1" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.531 [INFO][2617] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" iface="eth0" netns="/var/run/netns/cni-42e100c3-e56d-ead1-49c1-43ca10c64fe1" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.531 [INFO][2617] k8s.go 585: Releasing IP address(es) ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.531 [INFO][2617] utils.go 188: Calico CNI releasing IP address ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.546 [INFO][2625] ipam_plugin.go 415: Releasing address using handleID ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.546 [INFO][2625] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.546 [INFO][2625] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.553 [WARNING][2625] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.553 [INFO][2625] ipam_plugin.go 443: Releasing address using workloadID ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.554 [INFO][2625] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:38.556514 env[1114]: 2024-02-09 18:56:38.555 [INFO][2617] k8s.go 591: Teardown processing complete. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:38.558885 env[1114]: time="2024-02-09T18:56:38.557520430Z" level=info msg="TearDown network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\" successfully" Feb 9 18:56:38.558885 env[1114]: time="2024-02-09T18:56:38.557579521Z" level=info msg="StopPodSandbox for \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\" returns successfully" Feb 9 18:56:38.558885 env[1114]: time="2024-02-09T18:56:38.558234316Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-t5fwn,Uid:179a0837-9f75-41e3-b391-c4ebe7724b29,Namespace:default,Attempt:1,}" Feb 9 18:56:38.558334 systemd[1]: run-netns-cni\x2d42e100c3\x2de56d\x2dead1\x2d49c1\x2d43ca10c64fe1.mount: Deactivated successfully. Feb 9 18:56:38.712699 systemd-networkd[1014]: calidf6165f2779: Link UP Feb 9 18:56:38.714479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:56:38.714604 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidf6165f2779: link becomes ready Feb 9 18:56:38.714473 systemd-networkd[1014]: calidf6165f2779: Gained carrier Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.655 [INFO][2634] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0 nginx-deployment-8ffc5cf85- default 179a0837-9f75-41e3-b391-c4ebe7724b29 980 0 2024-02-09 18:56:24 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.90 nginx-deployment-8ffc5cf85-t5fwn eth0 default [] [] [kns.default ksa.default.default] calidf6165f2779 [] []}} ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t5fwn" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.655 [INFO][2634] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t5fwn" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.679 [INFO][2648] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" HandleID="k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.689 [INFO][2648] ipam_plugin.go 268: Auto assigning IP ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" HandleID="k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000247930), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.90", "pod":"nginx-deployment-8ffc5cf85-t5fwn", "timestamp":"2024-02-09 18:56:38.679684187 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.689 [INFO][2648] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.689 [INFO][2648] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.689 [INFO][2648] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.691 [INFO][2648] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.694 [INFO][2648] ipam.go 372: Looking up existing affinities for host host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.697 [INFO][2648] ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.699 [INFO][2648] ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.701 [INFO][2648] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.701 [INFO][2648] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.702 [INFO][2648] ipam.go 1682: Creating new handle: k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.705 [INFO][2648] ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.709 [INFO][2648] ipam.go 1216: Successfully claimed IPs: [192.168.37.66/26] block=192.168.37.64/26 handle="k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.709 [INFO][2648] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.66/26] handle="k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" host="10.0.0.90" Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.709 [INFO][2648] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:38.724620 env[1114]: 2024-02-09 18:56:38.709 [INFO][2648] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.37.66/26] IPv6=[] ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" HandleID="k8s-pod-network.af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.725290 env[1114]: 2024-02-09 18:56:38.710 [INFO][2634] k8s.go 385: Populated endpoint ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t5fwn" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"179a0837-9f75-41e3-b391-c4ebe7724b29", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-t5fwn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidf6165f2779", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:38.725290 env[1114]: 2024-02-09 18:56:38.710 [INFO][2634] k8s.go 386: Calico CNI using IPs: [192.168.37.66/32] ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t5fwn" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.725290 env[1114]: 2024-02-09 18:56:38.711 [INFO][2634] dataplane_linux.go 68: Setting the host side veth name to calidf6165f2779 ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t5fwn" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.725290 env[1114]: 2024-02-09 18:56:38.715 [INFO][2634] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t5fwn" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.725290 env[1114]: 2024-02-09 18:56:38.715 [INFO][2634] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t5fwn" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"179a0837-9f75-41e3-b391-c4ebe7724b29", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e", Pod:"nginx-deployment-8ffc5cf85-t5fwn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidf6165f2779", MAC:"b6:b7:cf:c7:75:d5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:38.725290 env[1114]: 2024-02-09 18:56:38.719 [INFO][2634] k8s.go 491: Wrote updated endpoint to datastore ContainerID="af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t5fwn" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:38.732000 audit[2673]: NETFILTER_CFG table=filter:92 family=2 entries=40 op=nft_register_chain pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:38.737457 kernel: kauditd_printk_skb: 211 callbacks suppressed Feb 9 18:56:38.737592 kernel: audit: type=1325 audit(1707504998.732:720): table=filter:92 family=2 entries=40 op=nft_register_chain pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:38.737616 kernel: audit: type=1300 audit(1707504998.732:720): arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7fff90ca0b40 a2=0 a3=7fff90ca0b2c items=0 ppid=2304 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.732000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7fff90ca0b40 a2=0 a3=7fff90ca0b2c items=0 ppid=2304 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.737747 env[1114]: time="2024-02-09T18:56:38.736588106Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:38.737747 env[1114]: time="2024-02-09T18:56:38.736628843Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:38.737747 env[1114]: time="2024-02-09T18:56:38.736640074Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:38.737747 env[1114]: time="2024-02-09T18:56:38.736835603Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e pid=2679 runtime=io.containerd.runc.v2 Feb 9 18:56:38.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:38.741198 kernel: audit: type=1327 audit(1707504998.732:720): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:38.753906 systemd[1]: Started cri-containerd-af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e.scope. Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.772776 kernel: audit: type=1400 audit(1707504998.767:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.772830 kernel: audit: type=1400 audit(1707504998.767:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.772850 kernel: audit: type=1400 audit(1707504998.767:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.776674 kernel: audit: type=1400 audit(1707504998.767:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.776771 kernel: audit: type=1400 audit(1707504998.767:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.780573 kernel: audit: type=1400 audit(1707504998.767:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.780621 kernel: audit: type=1400 audit(1707504998.767:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit: BPF prog-id=89 op=LOAD Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2679 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306137343438323635376537306234653036623035663935613830 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2679 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306137343438323635376537306234653036623035663935613830 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.771000 audit: BPF prog-id=90 op=LOAD Feb 9 18:56:38.771000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a5150 items=0 ppid=2679 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306137343438323635376537306234653036623035663935613830 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.773000 audit: BPF prog-id=91 op=LOAD Feb 9 18:56:38.773000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a5198 items=0 ppid=2679 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306137343438323635376537306234653036623035663935613830 Feb 9 18:56:38.777000 audit: BPF prog-id=91 op=UNLOAD Feb 9 18:56:38.777000 audit: BPF prog-id=90 op=UNLOAD Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:38.777000 audit: BPF prog-id=92 op=LOAD Feb 9 18:56:38.777000 audit[2689]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a55a8 items=0 ppid=2679 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:38.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166306137343438323635376537306234653036623035663935613830 Feb 9 18:56:38.782731 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:56:38.828040 env[1114]: time="2024-02-09T18:56:38.827916259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-t5fwn,Uid:179a0837-9f75-41e3-b391-c4ebe7724b29,Namespace:default,Attempt:1,} returns sandbox id \"af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e\"" Feb 9 18:56:39.292844 kubelet[1421]: E0209 18:56:39.292793 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:39.589243 env[1114]: time="2024-02-09T18:56:39.589148319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:39.590719 env[1114]: time="2024-02-09T18:56:39.590681629Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:39.591993 env[1114]: time="2024-02-09T18:56:39.591956433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:39.593323 env[1114]: time="2024-02-09T18:56:39.593294094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:39.593789 env[1114]: time="2024-02-09T18:56:39.593760554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 18:56:39.594225 env[1114]: time="2024-02-09T18:56:39.594201165Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 18:56:39.595179 env[1114]: time="2024-02-09T18:56:39.595141587Z" level=info msg="CreateContainer within sandbox \"94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 18:56:39.606489 env[1114]: time="2024-02-09T18:56:39.606456259Z" level=info msg="CreateContainer within sandbox \"94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"dd64fec0d4e0a868af49e5c1c3d3c856a6ea53884f7a33fb6a9300312350a43e\"" Feb 9 18:56:39.606853 env[1114]: time="2024-02-09T18:56:39.606833020Z" level=info msg="StartContainer for \"dd64fec0d4e0a868af49e5c1c3d3c856a6ea53884f7a33fb6a9300312350a43e\"" Feb 9 18:56:39.626484 systemd[1]: Started cri-containerd-dd64fec0d4e0a868af49e5c1c3d3c856a6ea53884f7a33fb6a9300312350a43e.scope. Feb 9 18:56:39.679000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.679000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2567 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:39.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363466656330643465306138363861663439653563316333643363 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit: BPF prog-id=93 op=LOAD Feb 9 18:56:39.680000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e1be0 items=0 ppid=2567 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:39.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363466656330643465306138363861663439653563316333643363 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit: BPF prog-id=94 op=LOAD Feb 9 18:56:39.680000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e1c28 items=0 ppid=2567 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:39.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363466656330643465306138363861663439653563316333643363 Feb 9 18:56:39.680000 audit: BPF prog-id=94 op=UNLOAD Feb 9 18:56:39.680000 audit: BPF prog-id=93 op=UNLOAD Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:39.680000 audit: BPF prog-id=95 op=LOAD Feb 9 18:56:39.680000 audit[2722]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e1cb8 items=0 ppid=2567 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:39.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363466656330643465306138363861663439653563316333643363 Feb 9 18:56:39.776869 env[1114]: time="2024-02-09T18:56:39.776809845Z" level=info msg="StartContainer for \"dd64fec0d4e0a868af49e5c1c3d3c856a6ea53884f7a33fb6a9300312350a43e\" returns successfully" Feb 9 18:56:40.089539 systemd-networkd[1014]: calidf6165f2779: Gained IPv6LL Feb 9 18:56:40.293140 kubelet[1421]: E0209 18:56:40.293078 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:41.293491 kubelet[1421]: E0209 18:56:41.293442 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:42.294491 kubelet[1421]: E0209 18:56:42.294446 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:43.255226 kubelet[1421]: E0209 18:56:43.255179 1421 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:43.263753 env[1114]: time="2024-02-09T18:56:43.263710582Z" level=info msg="StopPodSandbox for \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\"" Feb 9 18:56:43.295151 kubelet[1421]: E0209 18:56:43.295107 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:43.377546 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4084571543.mount: Deactivated successfully. Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.370 [WARNING][2771] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"179a0837-9f75-41e3-b391-c4ebe7724b29", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e", Pod:"nginx-deployment-8ffc5cf85-t5fwn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidf6165f2779", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.370 [INFO][2771] k8s.go 578: Cleaning up netns ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.370 [INFO][2771] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" iface="eth0" netns="" Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.370 [INFO][2771] k8s.go 585: Releasing IP address(es) ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.370 [INFO][2771] utils.go 188: Calico CNI releasing IP address ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.393 [INFO][2781] ipam_plugin.go 415: Releasing address using handleID ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.393 [INFO][2781] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.393 [INFO][2781] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.401 [WARNING][2781] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.401 [INFO][2781] ipam_plugin.go 443: Releasing address using workloadID ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.403 [INFO][2781] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:43.405947 env[1114]: 2024-02-09 18:56:43.404 [INFO][2771] k8s.go 591: Teardown processing complete. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:43.406526 env[1114]: time="2024-02-09T18:56:43.405978104Z" level=info msg="TearDown network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\" successfully" Feb 9 18:56:43.406526 env[1114]: time="2024-02-09T18:56:43.406021826Z" level=info msg="StopPodSandbox for \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\" returns successfully" Feb 9 18:56:43.406587 env[1114]: time="2024-02-09T18:56:43.406528169Z" level=info msg="RemovePodSandbox for \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\"" Feb 9 18:56:43.406587 env[1114]: time="2024-02-09T18:56:43.406559279Z" level=info msg="Forcibly stopping sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\"" Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.752 [WARNING][2807] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"179a0837-9f75-41e3-b391-c4ebe7724b29", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e", Pod:"nginx-deployment-8ffc5cf85-t5fwn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidf6165f2779", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.752 [INFO][2807] k8s.go 578: Cleaning up netns ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.752 [INFO][2807] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" iface="eth0" netns="" Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.752 [INFO][2807] k8s.go 585: Releasing IP address(es) ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.753 [INFO][2807] utils.go 188: Calico CNI releasing IP address ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.768 [INFO][2817] ipam_plugin.go 415: Releasing address using handleID ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.769 [INFO][2817] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.769 [INFO][2817] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.775 [WARNING][2817] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.776 [INFO][2817] ipam_plugin.go 443: Releasing address using workloadID ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" HandleID="k8s-pod-network.defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Workload="10.0.0.90-k8s-nginx--deployment--8ffc5cf85--t5fwn-eth0" Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.777 [INFO][2817] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:43.779711 env[1114]: 2024-02-09 18:56:43.778 [INFO][2807] k8s.go 591: Teardown processing complete. ContainerID="defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12" Feb 9 18:56:43.780167 env[1114]: time="2024-02-09T18:56:43.779750017Z" level=info msg="TearDown network for sandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\" successfully" Feb 9 18:56:43.989316 env[1114]: time="2024-02-09T18:56:43.989220949Z" level=info msg="RemovePodSandbox \"defdd89170f053ac6a6777874ed59f86c5bc3e5d08ba46ea107527089da87c12\" returns successfully" Feb 9 18:56:43.989917 env[1114]: time="2024-02-09T18:56:43.989886803Z" level=info msg="StopPodSandbox for \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\"" Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.021 [WARNING][2840] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-csi--node--driver--x8mc9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ed73ea14-de39-40f3-8033-40b7fc317b23", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9", Pod:"csi-node-driver-x8mc9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14710870acb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.022 [INFO][2840] k8s.go 578: Cleaning up netns ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.022 [INFO][2840] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" iface="eth0" netns="" Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.022 [INFO][2840] k8s.go 585: Releasing IP address(es) ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.022 [INFO][2840] utils.go 188: Calico CNI releasing IP address ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.043 [INFO][2847] ipam_plugin.go 415: Releasing address using handleID ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.043 [INFO][2847] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.043 [INFO][2847] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.050 [WARNING][2847] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.050 [INFO][2847] ipam_plugin.go 443: Releasing address using workloadID ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.051 [INFO][2847] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:44.054263 env[1114]: 2024-02-09 18:56:44.053 [INFO][2840] k8s.go 591: Teardown processing complete. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:44.054263 env[1114]: time="2024-02-09T18:56:44.054222107Z" level=info msg="TearDown network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\" successfully" Feb 9 18:56:44.054263 env[1114]: time="2024-02-09T18:56:44.054256641Z" level=info msg="StopPodSandbox for \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\" returns successfully" Feb 9 18:56:44.055591 env[1114]: time="2024-02-09T18:56:44.055539056Z" level=info msg="RemovePodSandbox for \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\"" Feb 9 18:56:44.055642 env[1114]: time="2024-02-09T18:56:44.055597906Z" level=info msg="Forcibly stopping sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\"" Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.084 [WARNING][2869] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-csi--node--driver--x8mc9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ed73ea14-de39-40f3-8033-40b7fc317b23", ResourceVersion:"975", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 55, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9", Pod:"csi-node-driver-x8mc9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14710870acb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.084 [INFO][2869] k8s.go 578: Cleaning up netns ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.085 [INFO][2869] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" iface="eth0" netns="" Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.085 [INFO][2869] k8s.go 585: Releasing IP address(es) ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.085 [INFO][2869] utils.go 188: Calico CNI releasing IP address ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.106 [INFO][2877] ipam_plugin.go 415: Releasing address using handleID ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.106 [INFO][2877] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.107 [INFO][2877] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.114 [WARNING][2877] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.114 [INFO][2877] ipam_plugin.go 443: Releasing address using workloadID ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" HandleID="k8s-pod-network.215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Workload="10.0.0.90-k8s-csi--node--driver--x8mc9-eth0" Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.115 [INFO][2877] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:44.118408 env[1114]: 2024-02-09 18:56:44.117 [INFO][2869] k8s.go 591: Teardown processing complete. ContainerID="215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62" Feb 9 18:56:44.118845 env[1114]: time="2024-02-09T18:56:44.118453570Z" level=info msg="TearDown network for sandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\" successfully" Feb 9 18:56:44.121140 env[1114]: time="2024-02-09T18:56:44.121090583Z" level=info msg="RemovePodSandbox \"215a036a5cfd3f1f89284fd26fb4db0a6e2daebc7897297e78573a7669fcbe62\" returns successfully" Feb 9 18:56:44.295346 kubelet[1421]: E0209 18:56:44.295277 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:45.295634 kubelet[1421]: E0209 18:56:45.295589 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:46.295985 kubelet[1421]: E0209 18:56:46.295937 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:46.394411 env[1114]: time="2024-02-09T18:56:46.394336466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:46.397459 env[1114]: time="2024-02-09T18:56:46.397430387Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:46.399831 env[1114]: time="2024-02-09T18:56:46.399784988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:46.401367 env[1114]: time="2024-02-09T18:56:46.401340555Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:46.402016 env[1114]: time="2024-02-09T18:56:46.401980469Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 18:56:46.402894 env[1114]: time="2024-02-09T18:56:46.402853381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 18:56:46.403533 env[1114]: time="2024-02-09T18:56:46.403507291Z" level=info msg="CreateContainer within sandbox \"af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 18:56:46.515323 env[1114]: time="2024-02-09T18:56:46.515242196Z" level=info msg="CreateContainer within sandbox \"af0a74482657e70b4e06b05f95a80c7b00a3422c75e5ed0c3a2ac77c7392046e\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"332ede3d44d97d67c79173276d84ecb26f2ce66e4145c183394e5b9dcdbd632e\"" Feb 9 18:56:46.515795 env[1114]: time="2024-02-09T18:56:46.515768335Z" level=info msg="StartContainer for \"332ede3d44d97d67c79173276d84ecb26f2ce66e4145c183394e5b9dcdbd632e\"" Feb 9 18:56:46.530340 systemd[1]: run-containerd-runc-k8s.io-332ede3d44d97d67c79173276d84ecb26f2ce66e4145c183394e5b9dcdbd632e-runc.ZIElR7.mount: Deactivated successfully. Feb 9 18:56:46.533993 systemd[1]: Started cri-containerd-332ede3d44d97d67c79173276d84ecb26f2ce66e4145c183394e5b9dcdbd632e.scope. Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.557536 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 9 18:56:46.557596 kernel: audit: type=1400 audit(1707505006.541:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.557623 kernel: audit: type=1400 audit(1707505006.541:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.561674 kernel: audit: type=1400 audit(1707505006.541:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.563835 kernel: audit: type=1400 audit(1707505006.541:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.563877 kernel: audit: type=1400 audit(1707505006.541:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.567770 kernel: audit: type=1400 audit(1707505006.541:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.567809 kernel: audit: type=1400 audit(1707505006.541:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.571866 kernel: audit: type=1400 audit(1707505006.541:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.571905 kernel: audit: type=1400 audit(1707505006.541:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.577518 kernel: audit: type=1400 audit(1707505006.556:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit: BPF prog-id=96 op=LOAD Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2679 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:46.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326564653364343464393764363763373931373332373664383465 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2679 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:46.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326564653364343464393764363763373931373332373664383465 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.556000 audit: BPF prog-id=97 op=LOAD Feb 9 18:56:46.556000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d6be0 items=0 ppid=2679 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:46.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326564653364343464393764363763373931373332373664383465 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.558000 audit: BPF prog-id=98 op=LOAD Feb 9 18:56:46.558000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d6c28 items=0 ppid=2679 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:46.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326564653364343464393764363763373931373332373664383465 Feb 9 18:56:46.560000 audit: BPF prog-id=98 op=UNLOAD Feb 9 18:56:46.560000 audit: BPF prog-id=97 op=UNLOAD Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { perfmon } for pid=2900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit[2900]: AVC avc: denied { bpf } for pid=2900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:46.560000 audit: BPF prog-id=99 op=LOAD Feb 9 18:56:46.560000 audit[2900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002d7038 items=0 ppid=2679 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:46.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326564653364343464393764363763373931373332373664383465 Feb 9 18:56:46.806093 env[1114]: time="2024-02-09T18:56:46.806013475Z" level=info msg="StartContainer for \"332ede3d44d97d67c79173276d84ecb26f2ce66e4145c183394e5b9dcdbd632e\" returns successfully" Feb 9 18:56:47.296962 kubelet[1421]: E0209 18:56:47.296894 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:47.568564 kubelet[1421]: I0209 18:56:47.568460 1421 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-t5fwn" podStartSLOduration=-9.223372013286343e+09 pod.CreationTimestamp="2024-02-09 18:56:24 +0000 UTC" firstStartedPulling="2024-02-09 18:56:38.829420075 +0000 UTC m=+55.866104428" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:56:47.568291587 +0000 UTC m=+64.604975940" watchObservedRunningTime="2024-02-09 18:56:47.568432552 +0000 UTC m=+64.605116905" Feb 9 18:56:48.158174 env[1114]: time="2024-02-09T18:56:48.158112271Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:48.160872 env[1114]: time="2024-02-09T18:56:48.160844209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:48.162318 env[1114]: time="2024-02-09T18:56:48.162286942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:48.164893 env[1114]: time="2024-02-09T18:56:48.164864660Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:48.165273 env[1114]: time="2024-02-09T18:56:48.165245887Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 18:56:48.166964 env[1114]: time="2024-02-09T18:56:48.166910338Z" level=info msg="CreateContainer within sandbox \"94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 18:56:48.180856 env[1114]: time="2024-02-09T18:56:48.180805581Z" level=info msg="CreateContainer within sandbox \"94ad3c5cd5b9aaab53a741479a7692f545ecc068cc28570f16165f905d6b34f9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0339a6d52a3806c205783d48fcbd7edb4770e9906c2869c60d9467d260fb8233\"" Feb 9 18:56:48.181356 env[1114]: time="2024-02-09T18:56:48.181318426Z" level=info msg="StartContainer for \"0339a6d52a3806c205783d48fcbd7edb4770e9906c2869c60d9467d260fb8233\"" Feb 9 18:56:48.200538 systemd[1]: Started cri-containerd-0339a6d52a3806c205783d48fcbd7edb4770e9906c2869c60d9467d260fb8233.scope. Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2567 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:48.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033333961366435326133383036633230353738336434386663626437 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.209000 audit: BPF prog-id=100 op=LOAD Feb 9 18:56:48.209000 audit[2955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002e1eb0 items=0 ppid=2567 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:48.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033333961366435326133383036633230353738336434386663626437 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit: BPF prog-id=101 op=LOAD Feb 9 18:56:48.210000 audit[2955]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002e1ef8 items=0 ppid=2567 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:48.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033333961366435326133383036633230353738336434386663626437 Feb 9 18:56:48.210000 audit: BPF prog-id=101 op=UNLOAD Feb 9 18:56:48.210000 audit: BPF prog-id=100 op=UNLOAD Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:48.210000 audit: BPF prog-id=102 op=LOAD Feb 9 18:56:48.210000 audit[2955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002e1f88 items=0 ppid=2567 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:48.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033333961366435326133383036633230353738336434386663626437 Feb 9 18:56:48.252433 env[1114]: time="2024-02-09T18:56:48.252358916Z" level=info msg="StartContainer for \"0339a6d52a3806c205783d48fcbd7edb4770e9906c2869c60d9467d260fb8233\" returns successfully" Feb 9 18:56:48.297086 kubelet[1421]: E0209 18:56:48.297029 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:48.340366 kubelet[1421]: I0209 18:56:48.340334 1421 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 18:56:48.340547 kubelet[1421]: I0209 18:56:48.340381 1421 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 18:56:48.573657 kubelet[1421]: I0209 18:56:48.573547 1421 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-x8mc9" podStartSLOduration=-9.22337198428127e+09 pod.CreationTimestamp="2024-02-09 18:55:56 +0000 UTC" firstStartedPulling="2024-02-09 18:56:37.431949976 +0000 UTC m=+54.468634339" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:56:48.57344491 +0000 UTC m=+65.610129253" watchObservedRunningTime="2024-02-09 18:56:48.573506636 +0000 UTC m=+65.610190989" Feb 9 18:56:49.298098 kubelet[1421]: E0209 18:56:49.298035 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:50.298784 kubelet[1421]: E0209 18:56:50.298711 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:51.299075 kubelet[1421]: E0209 18:56:51.299020 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:51.615000 audit[3011]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:51.617996 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 9 18:56:51.618132 kernel: audit: type=1325 audit(1707505011.615:769): table=filter:93 family=2 entries=18 op=nft_register_rule pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:51.615000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd7e470230 a2=0 a3=7ffd7e47021c items=0 ppid=1621 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:51.623901 kernel: audit: type=1300 audit(1707505011.615:769): arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd7e470230 a2=0 a3=7ffd7e47021c items=0 ppid=1621 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:51.623942 kernel: audit: type=1327 audit(1707505011.615:769): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:51.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:51.617000 audit[3011]: NETFILTER_CFG table=nat:94 family=2 entries=78 op=nft_register_rule pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:51.617000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd7e470230 a2=0 a3=7ffd7e47021c items=0 ppid=1621 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:51.638679 kernel: audit: type=1325 audit(1707505011.617:770): table=nat:94 family=2 entries=78 op=nft_register_rule pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:51.638808 kernel: audit: type=1300 audit(1707505011.617:770): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd7e470230 a2=0 a3=7ffd7e47021c items=0 ppid=1621 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:51.638837 kernel: audit: type=1327 audit(1707505011.617:770): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:51.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:51.656889 kubelet[1421]: I0209 18:56:51.656851 1421 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:56:51.661717 systemd[1]: Created slice kubepods-besteffort-podfde5f264_705c_42d3_874b_b7bac354c063.slice. Feb 9 18:56:51.667000 audit[3037]: NETFILTER_CFG table=filter:95 family=2 entries=30 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:51.667000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe42cb0590 a2=0 a3=7ffe42cb057c items=0 ppid=1621 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:51.675023 kernel: audit: type=1325 audit(1707505011.667:771): table=filter:95 family=2 entries=30 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:51.675081 kernel: audit: type=1300 audit(1707505011.667:771): arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe42cb0590 a2=0 a3=7ffe42cb057c items=0 ppid=1621 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:51.675108 kernel: audit: type=1327 audit(1707505011.667:771): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:51.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:51.669000 audit[3037]: NETFILTER_CFG table=nat:96 family=2 entries=78 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:51.669000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe42cb0590 a2=0 a3=7ffe42cb057c items=0 ppid=1621 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:51.679500 kernel: audit: type=1325 audit(1707505011.669:772): table=nat:96 family=2 entries=78 op=nft_register_rule pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:51.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:51.775977 kubelet[1421]: I0209 18:56:51.775933 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/fde5f264-705c-42d3-874b-b7bac354c063-data\") pod \"nfs-server-provisioner-0\" (UID: \"fde5f264-705c-42d3-874b-b7bac354c063\") " pod="default/nfs-server-provisioner-0" Feb 9 18:56:51.775977 kubelet[1421]: I0209 18:56:51.775981 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p72x2\" (UniqueName: \"kubernetes.io/projected/fde5f264-705c-42d3-874b-b7bac354c063-kube-api-access-p72x2\") pod \"nfs-server-provisioner-0\" (UID: \"fde5f264-705c-42d3-874b-b7bac354c063\") " pod="default/nfs-server-provisioner-0" Feb 9 18:56:51.964865 env[1114]: time="2024-02-09T18:56:51.964727679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:fde5f264-705c-42d3-874b-b7bac354c063,Namespace:default,Attempt:0,}" Feb 9 18:56:52.158765 systemd-networkd[1014]: cali60e51b789ff: Link UP Feb 9 18:56:52.160648 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:56:52.160695 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 18:56:52.160906 systemd-networkd[1014]: cali60e51b789ff: Gained carrier Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.095 [INFO][3039] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default fde5f264-705c-42d3-874b-b7bac354c063 1048 0 2024-02-09 18:56:51 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.90 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.095 [INFO][3039] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.118 [INFO][3053] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" HandleID="k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Workload="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.128 [INFO][3053] ipam_plugin.go 268: Auto assigning IP ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" HandleID="k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Workload="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5910), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.90", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 18:56:52.11878857 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.128 [INFO][3053] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.128 [INFO][3053] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.128 [INFO][3053] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.129 [INFO][3053] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.132 [INFO][3053] ipam.go 372: Looking up existing affinities for host host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.136 [INFO][3053] ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.137 [INFO][3053] ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.138 [INFO][3053] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.138 [INFO][3053] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.140 [INFO][3053] ipam.go 1682: Creating new handle: k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190 Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.143 [INFO][3053] ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.155 [INFO][3053] ipam.go 1216: Successfully claimed IPs: [192.168.37.67/26] block=192.168.37.64/26 handle="k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.155 [INFO][3053] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.67/26] handle="k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" host="10.0.0.90" Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.155 [INFO][3053] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:56:52.278542 env[1114]: 2024-02-09 18:56:52.155 [INFO][3053] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.37.67/26] IPv6=[] ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" HandleID="k8s-pod-network.741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Workload="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:52.279200 env[1114]: 2024-02-09 18:56:52.156 [INFO][3039] k8s.go 385: Populated endpoint ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"fde5f264-705c-42d3-874b-b7bac354c063", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:52.279200 env[1114]: 2024-02-09 18:56:52.157 [INFO][3039] k8s.go 386: Calico CNI using IPs: [192.168.37.67/32] ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:52.279200 env[1114]: 2024-02-09 18:56:52.157 [INFO][3039] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:52.279200 env[1114]: 2024-02-09 18:56:52.161 [INFO][3039] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:52.279376 env[1114]: 2024-02-09 18:56:52.161 [INFO][3039] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"fde5f264-705c-42d3-874b-b7bac354c063", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"2e:25:1f:c8:6b:8a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:56:52.279376 env[1114]: 2024-02-09 18:56:52.277 [INFO][3039] k8s.go 491: Wrote updated endpoint to datastore ContainerID="741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:56:52.289000 audit[3079]: NETFILTER_CFG table=filter:97 family=2 entries=38 op=nft_register_chain pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:56:52.289000 audit[3079]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7fff47b7ce10 a2=0 a3=7fff47b7cdfc items=0 ppid=2304 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:52.289000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:56:52.299691 kubelet[1421]: E0209 18:56:52.299654 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:52.300050 env[1114]: time="2024-02-09T18:56:52.299746250Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:56:52.300050 env[1114]: time="2024-02-09T18:56:52.299792807Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:56:52.300050 env[1114]: time="2024-02-09T18:56:52.299807265Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:56:52.300050 env[1114]: time="2024-02-09T18:56:52.299942619Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190 pid=3087 runtime=io.containerd.runc.v2 Feb 9 18:56:52.310832 systemd[1]: Started cri-containerd-741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190.scope. Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.320000 audit: BPF prog-id=103 op=LOAD Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:52.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313439386561333834653566316662313364626233366633383063 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:52.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313439386561333834653566316662313364626233366633383063 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit: BPF prog-id=104 op=LOAD Feb 9 18:56:52.321000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019a210 items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:52.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313439386561333834653566316662313364626233366633383063 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit: BPF prog-id=105 op=LOAD Feb 9 18:56:52.321000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019a258 items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:52.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313439386561333834653566316662313364626233366633383063 Feb 9 18:56:52.321000 audit: BPF prog-id=105 op=UNLOAD Feb 9 18:56:52.321000 audit: BPF prog-id=104 op=UNLOAD Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:52.321000 audit: BPF prog-id=106 op=LOAD Feb 9 18:56:52.321000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019a668 items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:52.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734313439386561333834653566316662313364626233366633383063 Feb 9 18:56:52.323652 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:56:52.347102 env[1114]: time="2024-02-09T18:56:52.347049363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:fde5f264-705c-42d3-874b-b7bac354c063,Namespace:default,Attempt:0,} returns sandbox id \"741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190\"" Feb 9 18:56:52.348891 env[1114]: time="2024-02-09T18:56:52.348855868Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 18:56:53.300764 kubelet[1421]: E0209 18:56:53.300712 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:53.977607 systemd-networkd[1014]: cali60e51b789ff: Gained IPv6LL Feb 9 18:56:54.301532 kubelet[1421]: E0209 18:56:54.301449 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:55.301601 kubelet[1421]: E0209 18:56:55.301552 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:55.462823 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1218624522.mount: Deactivated successfully. Feb 9 18:56:56.302334 kubelet[1421]: E0209 18:56:56.302279 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:56.713340 systemd[1]: run-containerd-runc-k8s.io-1bc3671ff013f160af2399f6ddf1d1fccc10cf231e51dbaa0102d625e935b57c-runc.glbhxX.mount: Deactivated successfully. Feb 9 18:56:56.755099 kubelet[1421]: E0209 18:56:56.755076 1421 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 18:56:57.302400 kubelet[1421]: E0209 18:56:57.302345 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:58.302918 kubelet[1421]: E0209 18:56:58.302852 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:58.765929 env[1114]: time="2024-02-09T18:56:58.765858389Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:58.767478 env[1114]: time="2024-02-09T18:56:58.767431804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:58.768981 env[1114]: time="2024-02-09T18:56:58.768951998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:58.770461 env[1114]: time="2024-02-09T18:56:58.770438801Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:56:58.771081 env[1114]: time="2024-02-09T18:56:58.771047114Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 18:56:58.772472 env[1114]: time="2024-02-09T18:56:58.772443857Z" level=info msg="CreateContainer within sandbox \"741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 18:56:58.784117 env[1114]: time="2024-02-09T18:56:58.784073447Z" level=info msg="CreateContainer within sandbox \"741498ea384e5f1fb13dbb36f380c7a5152e43169afef10a0b2990194a110190\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"91614fa211f6ac2482724230a884a77ffd0934c5cbeece95fdcdd1176bbe2120\"" Feb 9 18:56:58.784466 env[1114]: time="2024-02-09T18:56:58.784433203Z" level=info msg="StartContainer for \"91614fa211f6ac2482724230a884a77ffd0934c5cbeece95fdcdd1176bbe2120\"" Feb 9 18:56:58.802111 systemd[1]: run-containerd-runc-k8s.io-91614fa211f6ac2482724230a884a77ffd0934c5cbeece95fdcdd1176bbe2120-runc.N3I3Lg.mount: Deactivated successfully. Feb 9 18:56:58.803682 systemd[1]: Started cri-containerd-91614fa211f6ac2482724230a884a77ffd0934c5cbeece95fdcdd1176bbe2120.scope. Feb 9 18:56:58.815422 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 18:56:58.815523 kernel: audit: type=1400 audit(1707505018.811:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.818178 kernel: audit: type=1400 audit(1707505018.811:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.818221 kernel: audit: type=1400 audit(1707505018.811:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.822372 kernel: audit: type=1400 audit(1707505018.811:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.822444 kernel: audit: type=1400 audit(1707505018.811:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.827005 kernel: audit: type=1400 audit(1707505018.811:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.827045 kernel: audit: type=1400 audit(1707505018.811:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.831691 kernel: audit: type=1400 audit(1707505018.811:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.831736 kernel: audit: type=1400 audit(1707505018.811:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.835831 kernel: audit: type=1400 audit(1707505018.811:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.811000 audit: BPF prog-id=107 op=LOAD Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3087 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:58.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363134666132313166366163323438323732343233306138383461 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3087 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:58.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363134666132313166366163323438323732343233306138383461 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit: BPF prog-id=108 op=LOAD Feb 9 18:56:58.812000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00032f070 items=0 ppid=3087 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:58.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363134666132313166366163323438323732343233306138383461 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.812000 audit: BPF prog-id=109 op=LOAD Feb 9 18:56:58.812000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00032f0b8 items=0 ppid=3087 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:58.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363134666132313166366163323438323732343233306138383461 Feb 9 18:56:58.814000 audit: BPF prog-id=109 op=UNLOAD Feb 9 18:56:58.814000 audit: BPF prog-id=108 op=UNLOAD Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:56:58.814000 audit: BPF prog-id=110 op=LOAD Feb 9 18:56:58.814000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032f4c8 items=0 ppid=3087 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:58.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363134666132313166366163323438323732343233306138383461 Feb 9 18:56:58.841493 env[1114]: time="2024-02-09T18:56:58.841459440Z" level=info msg="StartContainer for \"91614fa211f6ac2482724230a884a77ffd0934c5cbeece95fdcdd1176bbe2120\" returns successfully" Feb 9 18:56:58.876000 audit[3189]: AVC avc: denied { search } for pid=3189 comm="rpcbind" name="crypto" dev="proc" ino=23181 scontext=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:56:58.876000 audit[3189]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9f27b130c0 a2=0 a3=0 items=0 ppid=3169 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 key=(null) Feb 9 18:56:58.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 18:56:58.906000 audit[3194]: AVC avc: denied { search } for pid=3194 comm="dbus-daemon" name="crypto" dev="proc" ino=23181 scontext=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:56:58.906000 audit[3194]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f30168830c0 a2=0 a3=0 items=0 ppid=3169 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 key=(null) Feb 9 18:56:58.906000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 18:56:58.908000 audit[3195]: AVC avc: denied { watch } for pid=3195 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c816,c817 tclass=dir permissive=0 Feb 9 18:56:58.908000 audit[3195]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55a3935d6d30 a2=2c8 a3=7ffc3d22668c items=0 ppid=3169 pid=3195 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 key=(null) Feb 9 18:56:58.908000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 18:56:58.911000 audit[3196]: AVC avc: denied { read } for pid=3196 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 18:56:58.911000 audit[3196]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fb0c0d6e320 a1=80000 a2=d a3=7fffa8a191c0 items=0 ppid=3169 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 key=(null) Feb 9 18:56:58.911000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 18:56:58.912000 audit[3196]: AVC avc: denied { search } for pid=3196 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23181 scontext=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:56:58.912000 audit[3196]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb0c02c20c0 a2=0 a3=0 items=0 ppid=3169 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c816,c817 key=(null) Feb 9 18:56:58.912000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 18:56:59.303399 kubelet[1421]: E0209 18:56:59.303365 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:56:59.591411 kubelet[1421]: I0209 18:56:59.591300 1421 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.22337202826351e+09 pod.CreationTimestamp="2024-02-09 18:56:51 +0000 UTC" firstStartedPulling="2024-02-09 18:56:52.348291137 +0000 UTC m=+69.384975480" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:56:59.591163885 +0000 UTC m=+76.627848238" watchObservedRunningTime="2024-02-09 18:56:59.591265126 +0000 UTC m=+76.627949479" Feb 9 18:56:59.620000 audit[3239]: NETFILTER_CFG table=filter:98 family=2 entries=18 op=nft_register_rule pid=3239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:59.620000 audit[3239]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdc55f8320 a2=0 a3=7ffdc55f830c items=0 ppid=1621 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:59.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:56:59.623000 audit[3239]: NETFILTER_CFG table=nat:99 family=2 entries=162 op=nft_register_chain pid=3239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:56:59.623000 audit[3239]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffdc55f8320 a2=0 a3=7ffdc55f830c items=0 ppid=1621 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:59.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:00.304045 kubelet[1421]: E0209 18:57:00.304010 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:01.305208 kubelet[1421]: E0209 18:57:01.305155 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:02.305413 kubelet[1421]: E0209 18:57:02.305348 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:03.255040 kubelet[1421]: E0209 18:57:03.254972 1421 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:03.306321 kubelet[1421]: E0209 18:57:03.306240 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:04.306884 kubelet[1421]: E0209 18:57:04.306834 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:05.307601 kubelet[1421]: E0209 18:57:05.307535 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:06.308658 kubelet[1421]: E0209 18:57:06.308598 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:06.707858 kubelet[1421]: I0209 18:57:06.707809 1421 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:57:06.712459 systemd[1]: Created slice kubepods-besteffort-pod9b57145c_61a3_4059_95cc_7b7e5ef0a2ca.slice. Feb 9 18:57:06.718000 audit[3271]: NETFILTER_CFG table=filter:100 family=2 entries=7 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:06.720543 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 18:57:06.720606 kernel: audit: type=1325 audit(1707505026.718:817): table=filter:100 family=2 entries=7 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:06.718000 audit[3271]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffefb457a80 a2=0 a3=7ffefb457a6c items=0 ppid=1621 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.726121 kernel: audit: type=1300 audit(1707505026.718:817): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffefb457a80 a2=0 a3=7ffefb457a6c items=0 ppid=1621 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.726181 kernel: audit: type=1327 audit(1707505026.718:817): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:06.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:06.721000 audit[3271]: NETFILTER_CFG table=nat:101 family=2 entries=198 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:06.721000 audit[3271]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffefb457a80 a2=0 a3=7ffefb457a6c items=0 ppid=1621 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.734827 kernel: audit: type=1325 audit(1707505026.721:818): table=nat:101 family=2 entries=198 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:06.734869 kernel: audit: type=1300 audit(1707505026.721:818): arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffefb457a80 a2=0 a3=7ffefb457a6c items=0 ppid=1621 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.734895 kernel: audit: type=1327 audit(1707505026.721:818): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:06.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:06.754000 audit[3297]: NETFILTER_CFG table=filter:102 family=2 entries=8 op=nft_register_rule pid=3297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:06.754000 audit[3297]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe6d39f220 a2=0 a3=7ffe6d39f20c items=0 ppid=1621 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.761498 kernel: audit: type=1325 audit(1707505026.754:819): table=filter:102 family=2 entries=8 op=nft_register_rule pid=3297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:06.761558 kernel: audit: type=1300 audit(1707505026.754:819): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe6d39f220 a2=0 a3=7ffe6d39f20c items=0 ppid=1621 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.761586 kernel: audit: type=1327 audit(1707505026.754:819): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:06.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:06.757000 audit[3297]: NETFILTER_CFG table=nat:103 family=2 entries=198 op=nft_register_rule pid=3297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:06.757000 audit[3297]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffe6d39f220 a2=0 a3=7ffe6d39f20c items=0 ppid=1621 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:06.757000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:06.767416 kernel: audit: type=1325 audit(1707505026.757:820): table=nat:103 family=2 entries=198 op=nft_register_rule pid=3297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:06.845038 kubelet[1421]: I0209 18:57:06.844977 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9b57145c-61a3-4059-95cc-7b7e5ef0a2ca-calico-apiserver-certs\") pod \"calico-apiserver-74f45bf49d-j48cf\" (UID: \"9b57145c-61a3-4059-95cc-7b7e5ef0a2ca\") " pod="calico-apiserver/calico-apiserver-74f45bf49d-j48cf" Feb 9 18:57:06.845038 kubelet[1421]: I0209 18:57:06.845033 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p6f4k\" (UniqueName: \"kubernetes.io/projected/9b57145c-61a3-4059-95cc-7b7e5ef0a2ca-kube-api-access-p6f4k\") pod \"calico-apiserver-74f45bf49d-j48cf\" (UID: \"9b57145c-61a3-4059-95cc-7b7e5ef0a2ca\") " pod="calico-apiserver/calico-apiserver-74f45bf49d-j48cf" Feb 9 18:57:07.015506 env[1114]: time="2024-02-09T18:57:07.015374894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74f45bf49d-j48cf,Uid:9b57145c-61a3-4059-95cc-7b7e5ef0a2ca,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:57:07.166481 systemd-networkd[1014]: cali8802c79e55c: Link UP Feb 9 18:57:07.168569 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:57:07.168630 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8802c79e55c: link becomes ready Feb 9 18:57:07.168746 systemd-networkd[1014]: cali8802c79e55c: Gained carrier Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.055 [INFO][3300] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0 calico-apiserver-74f45bf49d- calico-apiserver 9b57145c-61a3-4059-95cc-7b7e5ef0a2ca 1153 0 2024-02-09 18:57:06 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74f45bf49d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.90 calico-apiserver-74f45bf49d-j48cf eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8802c79e55c [] []}} ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Namespace="calico-apiserver" Pod="calico-apiserver-74f45bf49d-j48cf" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.055 [INFO][3300] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Namespace="calico-apiserver" Pod="calico-apiserver-74f45bf49d-j48cf" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.078 [INFO][3314] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" HandleID="k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Workload="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.089 [INFO][3314] ipam_plugin.go 268: Auto assigning IP ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" HandleID="k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Workload="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000119060), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.90", "pod":"calico-apiserver-74f45bf49d-j48cf", "timestamp":"2024-02-09 18:57:07.078155703 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.089 [INFO][3314] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.090 [INFO][3314] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.090 [INFO][3314] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.094 [INFO][3314] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.097 [INFO][3314] ipam.go 372: Looking up existing affinities for host host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.101 [INFO][3314] ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.102 [INFO][3314] ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.104 [INFO][3314] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.104 [INFO][3314] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.105 [INFO][3314] ipam.go 1682: Creating new handle: k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.108 [INFO][3314] ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.163 [INFO][3314] ipam.go 1216: Successfully claimed IPs: [192.168.37.68/26] block=192.168.37.64/26 handle="k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.163 [INFO][3314] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.68/26] handle="k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" host="10.0.0.90" Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.163 [INFO][3314] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:57:07.286975 env[1114]: 2024-02-09 18:57:07.163 [INFO][3314] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.37.68/26] IPv6=[] ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" HandleID="k8s-pod-network.63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Workload="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" Feb 9 18:57:07.287909 env[1114]: 2024-02-09 18:57:07.164 [INFO][3300] k8s.go 385: Populated endpoint ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Namespace="calico-apiserver" Pod="calico-apiserver-74f45bf49d-j48cf" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0", GenerateName:"calico-apiserver-74f45bf49d-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b57145c-61a3-4059-95cc-7b7e5ef0a2ca", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 57, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74f45bf49d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"calico-apiserver-74f45bf49d-j48cf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.37.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8802c79e55c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:57:07.287909 env[1114]: 2024-02-09 18:57:07.164 [INFO][3300] k8s.go 386: Calico CNI using IPs: [192.168.37.68/32] ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Namespace="calico-apiserver" Pod="calico-apiserver-74f45bf49d-j48cf" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" Feb 9 18:57:07.287909 env[1114]: 2024-02-09 18:57:07.164 [INFO][3300] dataplane_linux.go 68: Setting the host side veth name to cali8802c79e55c ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Namespace="calico-apiserver" Pod="calico-apiserver-74f45bf49d-j48cf" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" Feb 9 18:57:07.287909 env[1114]: 2024-02-09 18:57:07.169 [INFO][3300] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Namespace="calico-apiserver" Pod="calico-apiserver-74f45bf49d-j48cf" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" Feb 9 18:57:07.287909 env[1114]: 2024-02-09 18:57:07.169 [INFO][3300] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Namespace="calico-apiserver" Pod="calico-apiserver-74f45bf49d-j48cf" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0", GenerateName:"calico-apiserver-74f45bf49d-", Namespace:"calico-apiserver", SelfLink:"", UID:"9b57145c-61a3-4059-95cc-7b7e5ef0a2ca", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 57, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74f45bf49d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d", Pod:"calico-apiserver-74f45bf49d-j48cf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.37.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8802c79e55c", MAC:"d6:f5:65:83:07:6d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:57:07.287909 env[1114]: 2024-02-09 18:57:07.283 [INFO][3300] k8s.go 491: Wrote updated endpoint to datastore ContainerID="63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d" Namespace="calico-apiserver" Pod="calico-apiserver-74f45bf49d-j48cf" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--74f45bf49d--j48cf-eth0" Feb 9 18:57:07.302000 audit[3341]: NETFILTER_CFG table=filter:104 family=2 entries=55 op=nft_register_chain pid=3341 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:57:07.302000 audit[3341]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffcfe1f57c0 a2=0 a3=7ffcfe1f57ac items=0 ppid=2304 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:07.302000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:57:07.309550 kubelet[1421]: E0209 18:57:07.309509 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:07.744705 env[1114]: time="2024-02-09T18:57:07.744620020Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:57:07.744705 env[1114]: time="2024-02-09T18:57:07.744669733Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:57:07.744705 env[1114]: time="2024-02-09T18:57:07.744682397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:57:07.744932 env[1114]: time="2024-02-09T18:57:07.744817361Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d pid=3351 runtime=io.containerd.runc.v2 Feb 9 18:57:07.754894 systemd[1]: Started cri-containerd-63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d.scope. Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.763000 audit: BPF prog-id=111 op=LOAD Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:07.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373031353738343838623564313638663864373236363964336562 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:07.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373031353738343838623564313638663864373236363964336562 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit: BPF prog-id=112 op=LOAD Feb 9 18:57:07.764000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001d2c40 items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:07.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373031353738343838623564313638663864373236363964336562 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit: BPF prog-id=113 op=LOAD Feb 9 18:57:07.764000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001d2c88 items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:07.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373031353738343838623564313638663864373236363964336562 Feb 9 18:57:07.764000 audit: BPF prog-id=113 op=UNLOAD Feb 9 18:57:07.764000 audit: BPF prog-id=112 op=UNLOAD Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { perfmon } for pid=3361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit[3361]: AVC avc: denied { bpf } for pid=3361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:07.764000 audit: BPF prog-id=114 op=LOAD Feb 9 18:57:07.764000 audit[3361]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001d3098 items=0 ppid=3351 pid=3361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:07.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633373031353738343838623564313638663864373236363964336562 Feb 9 18:57:07.766352 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:57:07.795377 env[1114]: time="2024-02-09T18:57:07.795331860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74f45bf49d-j48cf,Uid:9b57145c-61a3-4059-95cc-7b7e5ef0a2ca,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d\"" Feb 9 18:57:07.797206 env[1114]: time="2024-02-09T18:57:07.797186931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:57:08.310270 kubelet[1421]: E0209 18:57:08.310219 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:08.313646 systemd-networkd[1014]: cali8802c79e55c: Gained IPv6LL Feb 9 18:57:08.748498 kubelet[1421]: I0209 18:57:08.748454 1421 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:57:08.752536 systemd[1]: Created slice kubepods-besteffort-pod5a8167d4_4827_43ea_82b9_7a3fa8dae542.slice. Feb 9 18:57:08.856478 kubelet[1421]: I0209 18:57:08.856432 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-8554ba47-f001-4550-9e39-c8363def6077\" (UniqueName: \"kubernetes.io/nfs/5a8167d4-4827-43ea-82b9-7a3fa8dae542-pvc-8554ba47-f001-4550-9e39-c8363def6077\") pod \"test-pod-1\" (UID: \"5a8167d4-4827-43ea-82b9-7a3fa8dae542\") " pod="default/test-pod-1" Feb 9 18:57:08.856661 kubelet[1421]: I0209 18:57:08.856492 1421 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z2bv4\" (UniqueName: \"kubernetes.io/projected/5a8167d4-4827-43ea-82b9-7a3fa8dae542-kube-api-access-z2bv4\") pod \"test-pod-1\" (UID: \"5a8167d4-4827-43ea-82b9-7a3fa8dae542\") " pod="default/test-pod-1" Feb 9 18:57:08.963000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.963000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.967809 kernel: Failed to create system directory netfs Feb 9 18:57:08.967862 kernel: Failed to create system directory netfs Feb 9 18:57:08.967882 kernel: Failed to create system directory netfs Feb 9 18:57:08.963000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.963000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.969398 kernel: Failed to create system directory netfs Feb 9 18:57:08.963000 audit[3385]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5653c0b1e5e0 a1=153bc a2=5653bef5c2b0 a3=5 items=0 ppid=504 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:08.963000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.976909 kernel: Failed to create system directory fscache Feb 9 18:57:08.976970 kernel: Failed to create system directory fscache Feb 9 18:57:08.976986 kernel: Failed to create system directory fscache Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.977581 kernel: Failed to create system directory fscache Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.978874 kernel: Failed to create system directory fscache Feb 9 18:57:08.978922 kernel: Failed to create system directory fscache Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.980504 kernel: Failed to create system directory fscache Feb 9 18:57:08.980543 kernel: Failed to create system directory fscache Feb 9 18:57:08.980565 kernel: Failed to create system directory fscache Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.981586 kernel: Failed to create system directory fscache Feb 9 18:57:08.981623 kernel: Failed to create system directory fscache Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.982668 kernel: Failed to create system directory fscache Feb 9 18:57:08.982705 kernel: Failed to create system directory fscache Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.972000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:08.983769 kernel: Failed to create system directory fscache Feb 9 18:57:08.972000 audit[3385]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5653c0d339c0 a1=4c0fc a2=5653bef5c2b0 a3=5 items=0 ppid=504 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:08.972000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:57:08.985401 kernel: FS-Cache: Loaded Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.011426 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.011464 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.011488 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.011511 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.012405 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.012450 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.013854 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.013887 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.014028 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.015500 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.015528 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.015552 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.016468 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.016500 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.017435 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.017470 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.018403 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.018438 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.019844 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.019875 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.019890 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.020808 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.020839 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.021809 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.021854 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.022806 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.022835 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.023794 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.023821 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.024761 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.024812 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.025864 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.025908 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.026851 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.026883 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.028518 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.028552 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.028573 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.029520 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.029554 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.030510 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.030548 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.031577 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.031603 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.032589 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.032619 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.033783 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.033814 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.034803 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.034834 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.035804 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.035828 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.036807 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.036830 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.037815 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.037833 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.038823 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.038841 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.039834 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.039856 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.040834 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.040854 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.041886 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.041917 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.043407 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.043440 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.043454 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.044403 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.044430 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.045852 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.045871 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.045883 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.046860 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.046896 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.047858 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.047895 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.048832 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.048866 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.049805 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.049831 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.050775 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.050803 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.051782 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.051819 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.052745 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.052793 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.053706 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.053728 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.054679 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.054701 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.055645 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.055663 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.056620 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.056637 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.057645 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.057669 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.058606 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.058632 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.059600 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.059628 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.060635 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.060673 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.061773 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.061804 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.062748 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.062794 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.063834 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.063856 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.064810 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.064831 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.065807 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.065830 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.066904 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.066932 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.067876 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.067897 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.069398 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.069421 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.069439 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.070398 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.070415 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.071427 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.071449 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.072508 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.072535 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.000000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.073556 kernel: Failed to create system directory sunrpc Feb 9 18:57:09.080684 kernel: RPC: Registered named UNIX socket transport module. Feb 9 18:57:09.080724 kernel: RPC: Registered udp transport module. Feb 9 18:57:09.080741 kernel: RPC: Registered tcp transport module. Feb 9 18:57:09.081793 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 18:57:09.000000 audit[3385]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5653c0d7fad0 a1=1588c4 a2=5653bef5c2b0 a3=5 items=6 ppid=504 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.000000 audit: CWD cwd="/" Feb 9 18:57:09.000000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:09.000000 audit: PATH item=1 name=(null) inode=26705 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:09.000000 audit: PATH item=2 name=(null) inode=26705 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:09.000000 audit: PATH item=3 name=(null) inode=26706 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:09.000000 audit: PATH item=4 name=(null) inode=26705 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:09.000000 audit: PATH item=5 name=(null) inode=26707 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:57:09.000000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.106786 kernel: Failed to create system directory nfs Feb 9 18:57:09.106827 kernel: Failed to create system directory nfs Feb 9 18:57:09.106845 kernel: Failed to create system directory nfs Feb 9 18:57:09.106858 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.107756 kernel: Failed to create system directory nfs Feb 9 18:57:09.107792 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.108688 kernel: Failed to create system directory nfs Feb 9 18:57:09.108711 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.109619 kernel: Failed to create system directory nfs Feb 9 18:57:09.109648 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.110625 kernel: Failed to create system directory nfs Feb 9 18:57:09.110658 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.111609 kernel: Failed to create system directory nfs Feb 9 18:57:09.111641 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.112676 kernel: Failed to create system directory nfs Feb 9 18:57:09.112735 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.113597 kernel: Failed to create system directory nfs Feb 9 18:57:09.113629 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.114588 kernel: Failed to create system directory nfs Feb 9 18:57:09.114632 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.115621 kernel: Failed to create system directory nfs Feb 9 18:57:09.115652 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.116578 kernel: Failed to create system directory nfs Feb 9 18:57:09.116606 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.117513 kernel: Failed to create system directory nfs Feb 9 18:57:09.117540 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.118536 kernel: Failed to create system directory nfs Feb 9 18:57:09.118564 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.119519 kernel: Failed to create system directory nfs Feb 9 18:57:09.119547 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.120486 kernel: Failed to create system directory nfs Feb 9 18:57:09.120517 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.121476 kernel: Failed to create system directory nfs Feb 9 18:57:09.121515 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.122571 kernel: Failed to create system directory nfs Feb 9 18:57:09.122608 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.123619 kernel: Failed to create system directory nfs Feb 9 18:57:09.123648 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.124553 kernel: Failed to create system directory nfs Feb 9 18:57:09.124589 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.125503 kernel: Failed to create system directory nfs Feb 9 18:57:09.125539 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.126413 kernel: Failed to create system directory nfs Feb 9 18:57:09.126451 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.127796 kernel: Failed to create system directory nfs Feb 9 18:57:09.127827 kernel: Failed to create system directory nfs Feb 9 18:57:09.127852 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.128748 kernel: Failed to create system directory nfs Feb 9 18:57:09.128783 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.129674 kernel: Failed to create system directory nfs Feb 9 18:57:09.129706 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.130626 kernel: Failed to create system directory nfs Feb 9 18:57:09.130654 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.131567 kernel: Failed to create system directory nfs Feb 9 18:57:09.131594 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.132476 kernel: Failed to create system directory nfs Feb 9 18:57:09.132504 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.133405 kernel: Failed to create system directory nfs Feb 9 18:57:09.133430 kernel: Failed to create system directory nfs Feb 9 18:57:09.098000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.098000 audit[3385]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5653c0f22680 a1=e29dc a2=5653bef5c2b0 a3=5 items=0 ppid=504 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.098000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:57:09.146408 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.178631 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.178676 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.178698 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.179627 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.179649 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.180602 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.180624 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.181581 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.181609 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.182594 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.182622 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.183573 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.183601 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.184554 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.184590 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.185515 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.185538 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.186483 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.186509 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.187531 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.187552 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.188493 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.188519 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.189454 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.189476 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.190514 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.190536 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.191479 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.191500 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.192457 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.192484 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.193424 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.193447 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.194399 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.194421 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.195833 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.195856 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.195872 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.196798 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.196820 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.197853 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.197878 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.198852 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.198874 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.199843 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.199870 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.200830 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.200856 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.201814 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.201845 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.202775 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.202802 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.203747 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.203782 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.204789 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.204842 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.205722 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.205742 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.206657 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.206681 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.207587 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.207609 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.208521 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.208539 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.209451 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.209477 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.210844 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.210868 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.210883 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.211798 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.211858 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.212770 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.212792 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.213724 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.213752 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.214676 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.214697 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.215633 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.215659 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.216584 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.216611 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.217538 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.217559 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.218494 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.218522 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.219492 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.219523 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.220462 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.220487 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.221428 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.221470 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.222866 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.222897 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.222918 kernel: Failed to create system directory nfs4 Feb 9 18:57:09.167000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.310788 kubelet[1421]: E0209 18:57:09.310666 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:09.371600 kernel: NFS: Registering the id_resolver key type Feb 9 18:57:09.371753 kernel: Key type id_resolver registered Feb 9 18:57:09.371787 kernel: Key type id_legacy registered Feb 9 18:57:09.167000 audit[3390]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f519f769010 a1=1d3cc4 a2=564056ce32b0 a3=5 items=0 ppid=504 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.167000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.401648 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.401778 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.401803 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.402813 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.402835 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.403840 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.403879 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.404865 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.404887 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.405879 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.405909 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.406870 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.406892 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.407857 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.407909 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.408864 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.408900 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.409852 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.409890 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.410890 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.410927 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.411857 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.411885 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.412833 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.412869 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.376000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:57:09.413863 kernel: Failed to create system directory rpcgss Feb 9 18:57:09.376000 audit[3392]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff4d494d010 a1=4f524 a2=5578b8ae72b0 a3=5 items=0 ppid=504 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.376000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 18:57:09.482172 nfsidmap[3399]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 18:57:09.485277 nfsidmap[3402]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 18:57:09.493000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2712 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:09.493000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2712 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:09.493000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2712 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:09.493000 audit[1172]: AVC avc: denied { watch_reads } for pid=1172 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2712 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:09.493000 audit[1172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563a0bf9dfb0 a2=10 a3=ae0cfd1061018886 items=0 ppid=1 pid=1172 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.493000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:57:09.493000 audit[1172]: AVC avc: denied { watch_reads } for pid=1172 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2712 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:09.493000 audit[1172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563a0bf9dfb0 a2=10 a3=ae0cfd1061018886 items=0 ppid=1 pid=1172 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.493000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:57:09.493000 audit[1172]: AVC avc: denied { watch_reads } for pid=1172 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2712 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:57:09.493000 audit[1172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=563a0bf9dfb0 a2=10 a3=ae0cfd1061018886 items=0 ppid=1 pid=1172 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.493000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:57:09.655064 env[1114]: time="2024-02-09T18:57:09.655028653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5a8167d4-4827-43ea-82b9-7a3fa8dae542,Namespace:default,Attempt:0,}" Feb 9 18:57:09.774906 systemd-networkd[1014]: cali5ec59c6bf6e: Link UP Feb 9 18:57:09.776755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:57:09.776836 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 18:57:09.776428 systemd-networkd[1014]: cali5ec59c6bf6e: Gained carrier Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.697 [INFO][3405] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-test--pod--1-eth0 default 5a8167d4-4827-43ea-82b9-7a3fa8dae542 1175 0 2024-02-09 18:56:51 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.90 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.697 [INFO][3405] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.724 [INFO][3418] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" HandleID="k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Workload="10.0.0.90-k8s-test--pod--1-eth0" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.741 [INFO][3418] ipam_plugin.go 268: Auto assigning IP ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" HandleID="k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Workload="10.0.0.90-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024ab70), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.90", "pod":"test-pod-1", "timestamp":"2024-02-09 18:57:09.724713324 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.741 [INFO][3418] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.741 [INFO][3418] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.741 [INFO][3418] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.743 [INFO][3418] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.746 [INFO][3418] ipam.go 372: Looking up existing affinities for host host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.750 [INFO][3418] ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.751 [INFO][3418] ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.753 [INFO][3418] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.754 [INFO][3418] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.755 [INFO][3418] ipam.go 1682: Creating new handle: k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1 Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.757 [INFO][3418] ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.771 [INFO][3418] ipam.go 1216: Successfully claimed IPs: [192.168.37.69/26] block=192.168.37.64/26 handle="k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.771 [INFO][3418] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.69/26] handle="k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" host="10.0.0.90" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.771 [INFO][3418] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.772 [INFO][3418] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.37.69/26] IPv6=[] ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" HandleID="k8s-pod-network.df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Workload="10.0.0.90-k8s-test--pod--1-eth0" Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.773 [INFO][3405] k8s.go 385: Populated endpoint ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5a8167d4-4827-43ea-82b9-7a3fa8dae542", ResourceVersion:"1175", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:57:09.784631 env[1114]: 2024-02-09 18:57:09.773 [INFO][3405] k8s.go 386: Calico CNI using IPs: [192.168.37.69/32] ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" Feb 9 18:57:09.785590 env[1114]: 2024-02-09 18:57:09.773 [INFO][3405] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" Feb 9 18:57:09.785590 env[1114]: 2024-02-09 18:57:09.776 [INFO][3405] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" Feb 9 18:57:09.785590 env[1114]: 2024-02-09 18:57:09.776 [INFO][3405] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5a8167d4-4827-43ea-82b9-7a3fa8dae542", ResourceVersion:"1175", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 56, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"f6:4e:b3:e3:e9:38", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:57:09.785590 env[1114]: 2024-02-09 18:57:09.783 [INFO][3405] k8s.go 491: Wrote updated endpoint to datastore ContainerID="df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" Feb 9 18:57:09.793000 audit[3441]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=3441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:57:09.793000 audit[3441]: SYSCALL arch=c000003e syscall=46 success=yes exit=20268 a0=3 a1=7ffd32b036c0 a2=0 a3=7ffd32b036ac items=0 ppid=2304 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.793000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:57:09.811034 env[1114]: time="2024-02-09T18:57:09.810949486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:57:09.811034 env[1114]: time="2024-02-09T18:57:09.810999490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:57:09.811034 env[1114]: time="2024-02-09T18:57:09.811015419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:57:09.811241 env[1114]: time="2024-02-09T18:57:09.811178205Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1 pid=3448 runtime=io.containerd.runc.v2 Feb 9 18:57:09.822694 systemd[1]: Started cri-containerd-df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1.scope. Feb 9 18:57:09.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit: BPF prog-id=115 op=LOAD Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3448 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323438313031363165653166636632373066366131326334303630 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3448 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323438313031363165653166636632373066366131326334303630 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.832000 audit: BPF prog-id=116 op=LOAD Feb 9 18:57:09.832000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002192c0 items=0 ppid=3448 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323438313031363165653166636632373066366131326334303630 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit: BPF prog-id=117 op=LOAD Feb 9 18:57:09.833000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000219308 items=0 ppid=3448 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323438313031363165653166636632373066366131326334303630 Feb 9 18:57:09.833000 audit: BPF prog-id=117 op=UNLOAD Feb 9 18:57:09.833000 audit: BPF prog-id=116 op=UNLOAD Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:09.833000 audit: BPF prog-id=118 op=LOAD Feb 9 18:57:09.833000 audit[3459]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000219718 items=0 ppid=3448 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:09.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323438313031363165653166636632373066366131326334303630 Feb 9 18:57:09.835149 systemd-resolved[1072]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 18:57:09.857650 env[1114]: time="2024-02-09T18:57:09.857603741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5a8167d4-4827-43ea-82b9-7a3fa8dae542,Namespace:default,Attempt:0,} returns sandbox id \"df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1\"" Feb 9 18:57:10.311798 kubelet[1421]: E0209 18:57:10.311746 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:11.311943 kubelet[1421]: E0209 18:57:11.311878 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:11.392805 systemd-networkd[1014]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 18:57:12.049968 env[1114]: time="2024-02-09T18:57:12.049882392Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:12.051485 env[1114]: time="2024-02-09T18:57:12.051432430Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:12.052987 env[1114]: time="2024-02-09T18:57:12.052964925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:12.055567 env[1114]: time="2024-02-09T18:57:12.055537853Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:12.056260 env[1114]: time="2024-02-09T18:57:12.056214983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 18:57:12.057817 env[1114]: time="2024-02-09T18:57:12.057786442Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 18:57:12.058716 env[1114]: time="2024-02-09T18:57:12.058673536Z" level=info msg="CreateContainer within sandbox \"63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:57:12.068942 env[1114]: time="2024-02-09T18:57:12.068885365Z" level=info msg="CreateContainer within sandbox \"63701578488b5d168f8d72669d3ebc4676a46b36d494c5654754194d882c382d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2d05fa8b87084b3db23b265a80821feebd2662467c7b3a352f738e992b454b9f\"" Feb 9 18:57:12.067000 audit[3506]: NETFILTER_CFG table=filter:106 family=2 entries=8 op=nft_register_rule pid=3506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:12.069399 env[1114]: time="2024-02-09T18:57:12.069350538Z" level=info msg="StartContainer for \"2d05fa8b87084b3db23b265a80821feebd2662467c7b3a352f738e992b454b9f\"" Feb 9 18:57:12.069820 kernel: kauditd_printk_skb: 476 callbacks suppressed Feb 9 18:57:12.069869 kernel: audit: type=1325 audit(1707505032.067:871): table=filter:106 family=2 entries=8 op=nft_register_rule pid=3506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:12.067000 audit[3506]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdc05d3c80 a2=0 a3=7ffdc05d3c6c items=0 ppid=1621 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.075623 kernel: audit: type=1300 audit(1707505032.067:871): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdc05d3c80 a2=0 a3=7ffdc05d3c6c items=0 ppid=1621 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:12.077629 kernel: audit: type=1327 audit(1707505032.067:871): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:12.082000 audit[3506]: NETFILTER_CFG table=nat:107 family=2 entries=198 op=nft_register_rule pid=3506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:12.087413 kernel: audit: type=1325 audit(1707505032.082:872): table=nat:107 family=2 entries=198 op=nft_register_rule pid=3506 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:12.082000 audit[3506]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffdc05d3c80 a2=0 a3=7ffdc05d3c6c items=0 ppid=1621 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.092156 systemd[1]: Started cri-containerd-2d05fa8b87084b3db23b265a80821feebd2662467c7b3a352f738e992b454b9f.scope. Feb 9 18:57:12.093483 kernel: audit: type=1300 audit(1707505032.082:872): arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffdc05d3c80 a2=0 a3=7ffdc05d3c6c items=0 ppid=1621 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:12.096420 kernel: audit: type=1327 audit(1707505032.082:872): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.106881 kernel: audit: type=1400 audit(1707505032.100:873): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.106921 kernel: audit: type=1400 audit(1707505032.100:874): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.109556 kernel: audit: type=1400 audit(1707505032.100:875): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.112275 kernel: audit: type=1400 audit(1707505032.100:876): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit: BPF prog-id=119 op=LOAD Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3351 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303566613862383730383462336462323362323635613830383231 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3351 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303566613862383730383462336462323362323635613830383231 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.105000 audit: BPF prog-id=120 op=LOAD Feb 9 18:57:12.105000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00008eb50 items=0 ppid=3351 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303566613862383730383462336462323362323635613830383231 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit: BPF prog-id=121 op=LOAD Feb 9 18:57:12.108000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00008eb98 items=0 ppid=3351 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303566613862383730383462336462323362323635613830383231 Feb 9 18:57:12.108000 audit: BPF prog-id=121 op=UNLOAD Feb 9 18:57:12.108000 audit: BPF prog-id=120 op=UNLOAD Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.108000 audit: BPF prog-id=122 op=LOAD Feb 9 18:57:12.108000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00008efa8 items=0 ppid=3351 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264303566613862383730383462336462323362323635613830383231 Feb 9 18:57:12.200417 env[1114]: time="2024-02-09T18:57:12.200342458Z" level=info msg="StartContainer for \"2d05fa8b87084b3db23b265a80821feebd2662467c7b3a352f738e992b454b9f\" returns successfully" Feb 9 18:57:12.313118 kubelet[1421]: E0209 18:57:12.312992 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:12.460625 env[1114]: time="2024-02-09T18:57:12.460570203Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:12.462230 env[1114]: time="2024-02-09T18:57:12.462200963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:12.463928 env[1114]: time="2024-02-09T18:57:12.463883570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:12.465398 env[1114]: time="2024-02-09T18:57:12.465363196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:12.465840 env[1114]: time="2024-02-09T18:57:12.465813521Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 18:57:12.467235 env[1114]: time="2024-02-09T18:57:12.467210041Z" level=info msg="CreateContainer within sandbox \"df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 18:57:12.485227 env[1114]: time="2024-02-09T18:57:12.485172412Z" level=info msg="CreateContainer within sandbox \"df24810161ee1fcf270f6a12c4060a09bab97b823efad5845591392571c580b1\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"61c89ea52ac9dba8cd9438939f52555713b041fc37414fd5349b724d3af57cb6\"" Feb 9 18:57:12.485739 env[1114]: time="2024-02-09T18:57:12.485708058Z" level=info msg="StartContainer for \"61c89ea52ac9dba8cd9438939f52555713b041fc37414fd5349b724d3af57cb6\"" Feb 9 18:57:12.506545 systemd[1]: Started cri-containerd-61c89ea52ac9dba8cd9438939f52555713b041fc37414fd5349b724d3af57cb6.scope. Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit: BPF prog-id=123 op=LOAD Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3448 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631633839656135326163396462613863643934333839333966353235 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3448 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631633839656135326163396462613863643934333839333966353235 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.519000 audit: BPF prog-id=124 op=LOAD Feb 9 18:57:12.519000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002187e0 items=0 ppid=3448 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631633839656135326163396462613863643934333839333966353235 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit: BPF prog-id=125 op=LOAD Feb 9 18:57:12.520000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218828 items=0 ppid=3448 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631633839656135326163396462613863643934333839333966353235 Feb 9 18:57:12.520000 audit: BPF prog-id=125 op=UNLOAD Feb 9 18:57:12.520000 audit: BPF prog-id=124 op=UNLOAD Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { perfmon } for pid=3554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit[3554]: AVC avc: denied { bpf } for pid=3554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:12.520000 audit: BPF prog-id=126 op=LOAD Feb 9 18:57:12.520000 audit[3554]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218c38 items=0 ppid=3448 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631633839656135326163396462613863643934333839333966353235 Feb 9 18:57:12.538312 env[1114]: time="2024-02-09T18:57:12.538267110Z" level=info msg="StartContainer for \"61c89ea52ac9dba8cd9438939f52555713b041fc37414fd5349b724d3af57cb6\" returns successfully" Feb 9 18:57:12.616877 kubelet[1421]: I0209 18:57:12.616758 1421 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74f45bf49d-j48cf" podStartSLOduration=-9.223372030238054e+09 pod.CreationTimestamp="2024-02-09 18:57:06 +0000 UTC" firstStartedPulling="2024-02-09 18:57:07.796710146 +0000 UTC m=+84.833394500" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:57:12.616195972 +0000 UTC m=+89.652880325" watchObservedRunningTime="2024-02-09 18:57:12.616722369 +0000 UTC m=+89.653406722" Feb 9 18:57:12.623157 kubelet[1421]: I0209 18:57:12.623043 1421 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.223372015231783e+09 pod.CreationTimestamp="2024-02-09 18:56:51 +0000 UTC" firstStartedPulling="2024-02-09 18:57:09.858872603 +0000 UTC m=+86.895556956" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:57:12.622893067 +0000 UTC m=+89.659577410" watchObservedRunningTime="2024-02-09 18:57:12.622992394 +0000 UTC m=+89.659676737" Feb 9 18:57:12.649000 audit[3629]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:12.649000 audit[3629]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff89b7efd0 a2=0 a3=7fff89b7efbc items=0 ppid=1621 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:12.651000 audit[3629]: NETFILTER_CFG table=nat:109 family=2 entries=198 op=nft_register_rule pid=3629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:57:12.651000 audit[3629]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7fff89b7efd0 a2=0 a3=7fff89b7efbc items=0 ppid=1621 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:12.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:57:12.795000 audit[3524]: AVC avc: denied { watch } for pid=3524 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_57_06.4275301770/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c70,c707 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c70,c707 tclass=file permissive=0 Feb 9 18:57:12.795000 audit[3524]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000df0360 a2=fc6 a3=0 items=0 ppid=3351 pid=3524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c70,c707 key=(null) Feb 9 18:57:12.795000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:57:13.066965 systemd[1]: run-containerd-runc-k8s.io-2d05fa8b87084b3db23b265a80821feebd2662467c7b3a352f738e992b454b9f-runc.kmvqSC.mount: Deactivated successfully. Feb 9 18:57:13.314144 kubelet[1421]: E0209 18:57:13.314085 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:57:14.315252 kubelet[1421]: E0209 18:57:14.315194 1421 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"