Feb 12 20:24:46.822216 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 20:24:46.822235 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:24:46.822243 kernel: BIOS-provided physical RAM map: Feb 12 20:24:46.822249 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 20:24:46.822254 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 20:24:46.822259 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 20:24:46.822266 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Feb 12 20:24:46.822272 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Feb 12 20:24:46.822278 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 20:24:46.822284 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 20:24:46.822289 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Feb 12 20:24:46.822295 kernel: NX (Execute Disable) protection: active Feb 12 20:24:46.822300 kernel: SMBIOS 2.8 present. Feb 12 20:24:46.822306 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Feb 12 20:24:46.822314 kernel: Hypervisor detected: KVM Feb 12 20:24:46.822320 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 20:24:46.822326 kernel: kvm-clock: cpu 0, msr 95faa001, primary cpu clock Feb 12 20:24:46.822332 kernel: kvm-clock: using sched offset of 2145354120 cycles Feb 12 20:24:46.822338 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 20:24:46.822345 kernel: tsc: Detected 2794.748 MHz processor Feb 12 20:24:46.822351 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 20:24:46.822357 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 20:24:46.822363 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Feb 12 20:24:46.822371 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 20:24:46.822377 kernel: Using GB pages for direct mapping Feb 12 20:24:46.822383 kernel: ACPI: Early table checksum verification disabled Feb 12 20:24:46.822389 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Feb 12 20:24:46.822395 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:24:46.822410 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:24:46.822427 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:24:46.822433 kernel: ACPI: FACS 0x000000009CFE0000 000040 Feb 12 20:24:46.822439 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:24:46.822447 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:24:46.822453 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:24:46.822459 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Feb 12 20:24:46.822469 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Feb 12 20:24:46.822475 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Feb 12 20:24:46.822481 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Feb 12 20:24:46.822487 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Feb 12 20:24:46.822493 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Feb 12 20:24:46.822503 kernel: No NUMA configuration found Feb 12 20:24:46.822509 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Feb 12 20:24:46.822516 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Feb 12 20:24:46.822522 kernel: Zone ranges: Feb 12 20:24:46.822529 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 20:24:46.822536 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Feb 12 20:24:46.822544 kernel: Normal empty Feb 12 20:24:46.822560 kernel: Movable zone start for each node Feb 12 20:24:46.822567 kernel: Early memory node ranges Feb 12 20:24:46.822573 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 20:24:46.822580 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Feb 12 20:24:46.822586 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Feb 12 20:24:46.822592 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 20:24:46.822599 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 20:24:46.822606 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Feb 12 20:24:46.822614 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 20:24:46.822628 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 20:24:46.822635 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 20:24:46.822642 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 20:24:46.822648 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 20:24:46.822655 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 20:24:46.822661 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 20:24:46.822668 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 20:24:46.822674 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 20:24:46.822682 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 20:24:46.822688 kernel: TSC deadline timer available Feb 12 20:24:46.822694 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 12 20:24:46.822701 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 12 20:24:46.822707 kernel: kvm-guest: setup PV sched yield Feb 12 20:24:46.822714 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Feb 12 20:24:46.822720 kernel: Booting paravirtualized kernel on KVM Feb 12 20:24:46.822727 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 20:24:46.822734 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 12 20:24:46.822740 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 12 20:24:46.822748 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 12 20:24:46.822754 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 12 20:24:46.822760 kernel: kvm-guest: setup async PF for cpu 0 Feb 12 20:24:46.822766 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Feb 12 20:24:46.822773 kernel: kvm-guest: PV spinlocks enabled Feb 12 20:24:46.822779 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 20:24:46.822786 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Feb 12 20:24:46.822792 kernel: Policy zone: DMA32 Feb 12 20:24:46.822799 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:24:46.822808 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:24:46.822814 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 20:24:46.822821 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 20:24:46.822827 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:24:46.822834 kernel: Memory: 2438768K/2571756K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 132728K reserved, 0K cma-reserved) Feb 12 20:24:46.822841 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 20:24:46.822847 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 20:24:46.822854 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 20:24:46.822862 kernel: rcu: Hierarchical RCU implementation. Feb 12 20:24:46.822869 kernel: rcu: RCU event tracing is enabled. Feb 12 20:24:46.822875 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 20:24:46.822882 kernel: Rude variant of Tasks RCU enabled. Feb 12 20:24:46.822888 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:24:46.822895 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:24:46.822901 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 20:24:46.822908 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 12 20:24:46.822914 kernel: random: crng init done Feb 12 20:24:46.822922 kernel: Console: colour VGA+ 80x25 Feb 12 20:24:46.822928 kernel: printk: console [ttyS0] enabled Feb 12 20:24:46.822935 kernel: ACPI: Core revision 20210730 Feb 12 20:24:46.822942 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 20:24:46.822948 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 20:24:46.822955 kernel: x2apic enabled Feb 12 20:24:46.822961 kernel: Switched APIC routing to physical x2apic. Feb 12 20:24:46.822968 kernel: kvm-guest: setup PV IPIs Feb 12 20:24:46.822974 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 20:24:46.822982 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 12 20:24:46.822988 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Feb 12 20:24:46.822995 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 12 20:24:46.823001 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 12 20:24:46.823007 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 12 20:24:46.823014 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 20:24:46.823020 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 20:24:46.823027 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 20:24:46.823034 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 20:24:46.823046 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 12 20:24:46.823052 kernel: RETBleed: Mitigation: untrained return thunk Feb 12 20:24:46.823060 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 20:24:46.823068 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 20:24:46.823075 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 20:24:46.823082 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 20:24:46.823088 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 20:24:46.823095 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 20:24:46.823102 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 20:24:46.823110 kernel: Freeing SMP alternatives memory: 32K Feb 12 20:24:46.823117 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:24:46.823124 kernel: LSM: Security Framework initializing Feb 12 20:24:46.823131 kernel: SELinux: Initializing. Feb 12 20:24:46.823138 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 20:24:46.823145 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 20:24:46.823151 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 12 20:24:46.823159 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 12 20:24:46.823166 kernel: ... version: 0 Feb 12 20:24:46.823173 kernel: ... bit width: 48 Feb 12 20:24:46.823180 kernel: ... generic registers: 6 Feb 12 20:24:46.823186 kernel: ... value mask: 0000ffffffffffff Feb 12 20:24:46.823193 kernel: ... max period: 00007fffffffffff Feb 12 20:24:46.823200 kernel: ... fixed-purpose events: 0 Feb 12 20:24:46.823207 kernel: ... event mask: 000000000000003f Feb 12 20:24:46.823214 kernel: signal: max sigframe size: 1776 Feb 12 20:24:46.823220 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:24:46.823228 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:24:46.823235 kernel: x86: Booting SMP configuration: Feb 12 20:24:46.823242 kernel: .... node #0, CPUs: #1 Feb 12 20:24:46.823249 kernel: kvm-clock: cpu 1, msr 95faa041, secondary cpu clock Feb 12 20:24:46.823255 kernel: kvm-guest: setup async PF for cpu 1 Feb 12 20:24:46.823262 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Feb 12 20:24:46.823269 kernel: #2 Feb 12 20:24:46.823276 kernel: kvm-clock: cpu 2, msr 95faa081, secondary cpu clock Feb 12 20:24:46.823282 kernel: kvm-guest: setup async PF for cpu 2 Feb 12 20:24:46.823290 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Feb 12 20:24:46.823297 kernel: #3 Feb 12 20:24:46.823304 kernel: kvm-clock: cpu 3, msr 95faa0c1, secondary cpu clock Feb 12 20:24:46.823310 kernel: kvm-guest: setup async PF for cpu 3 Feb 12 20:24:46.823317 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Feb 12 20:24:46.823324 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 20:24:46.823331 kernel: smpboot: Max logical packages: 1 Feb 12 20:24:46.823338 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Feb 12 20:24:46.823344 kernel: devtmpfs: initialized Feb 12 20:24:46.823352 kernel: x86/mm: Memory block size: 128MB Feb 12 20:24:46.823359 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:24:46.823366 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 20:24:46.823373 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:24:46.823380 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:24:46.823386 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:24:46.823393 kernel: audit: type=2000 audit(1707769487.189:1): state=initialized audit_enabled=0 res=1 Feb 12 20:24:46.823400 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:24:46.823407 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 20:24:46.823414 kernel: cpuidle: using governor menu Feb 12 20:24:46.823421 kernel: ACPI: bus type PCI registered Feb 12 20:24:46.823428 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:24:46.823435 kernel: dca service started, version 1.12.1 Feb 12 20:24:46.823441 kernel: PCI: Using configuration type 1 for base access Feb 12 20:24:46.823448 kernel: PCI: Using configuration type 1 for extended access Feb 12 20:24:46.823455 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 20:24:46.823462 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 20:24:46.823469 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:24:46.823477 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:24:46.823483 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:24:46.823490 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:24:46.823497 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:24:46.823504 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:24:46.823511 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:24:46.823517 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:24:46.823524 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 20:24:46.823531 kernel: ACPI: Interpreter enabled Feb 12 20:24:46.823539 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 20:24:46.823546 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 20:24:46.823571 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 20:24:46.823578 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 20:24:46.823585 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 20:24:46.823703 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:24:46.823715 kernel: acpiphp: Slot [3] registered Feb 12 20:24:46.823722 kernel: acpiphp: Slot [4] registered Feb 12 20:24:46.823730 kernel: acpiphp: Slot [5] registered Feb 12 20:24:46.823737 kernel: acpiphp: Slot [6] registered Feb 12 20:24:46.823744 kernel: acpiphp: Slot [7] registered Feb 12 20:24:46.823751 kernel: acpiphp: Slot [8] registered Feb 12 20:24:46.823757 kernel: acpiphp: Slot [9] registered Feb 12 20:24:46.823764 kernel: acpiphp: Slot [10] registered Feb 12 20:24:46.823771 kernel: acpiphp: Slot [11] registered Feb 12 20:24:46.823777 kernel: acpiphp: Slot [12] registered Feb 12 20:24:46.823784 kernel: acpiphp: Slot [13] registered Feb 12 20:24:46.823791 kernel: acpiphp: Slot [14] registered Feb 12 20:24:46.823799 kernel: acpiphp: Slot [15] registered Feb 12 20:24:46.823805 kernel: acpiphp: Slot [16] registered Feb 12 20:24:46.823812 kernel: acpiphp: Slot [17] registered Feb 12 20:24:46.823818 kernel: acpiphp: Slot [18] registered Feb 12 20:24:46.823825 kernel: acpiphp: Slot [19] registered Feb 12 20:24:46.823832 kernel: acpiphp: Slot [20] registered Feb 12 20:24:46.823839 kernel: acpiphp: Slot [21] registered Feb 12 20:24:46.823845 kernel: acpiphp: Slot [22] registered Feb 12 20:24:46.823852 kernel: acpiphp: Slot [23] registered Feb 12 20:24:46.823860 kernel: acpiphp: Slot [24] registered Feb 12 20:24:46.823866 kernel: acpiphp: Slot [25] registered Feb 12 20:24:46.823873 kernel: acpiphp: Slot [26] registered Feb 12 20:24:46.823880 kernel: acpiphp: Slot [27] registered Feb 12 20:24:46.823886 kernel: acpiphp: Slot [28] registered Feb 12 20:24:46.823894 kernel: acpiphp: Slot [29] registered Feb 12 20:24:46.823903 kernel: acpiphp: Slot [30] registered Feb 12 20:24:46.823911 kernel: acpiphp: Slot [31] registered Feb 12 20:24:46.823917 kernel: PCI host bridge to bus 0000:00 Feb 12 20:24:46.823995 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 20:24:46.824061 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 20:24:46.824122 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 20:24:46.824181 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 12 20:24:46.824246 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 20:24:46.824308 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 20:24:46.824408 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 20:24:46.824532 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 20:24:46.824683 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 20:24:46.824787 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 12 20:24:46.824888 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 20:24:46.824989 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 20:24:46.825085 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 20:24:46.825172 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 20:24:46.825270 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 20:24:46.825367 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 20:24:46.825438 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 20:24:46.825520 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 12 20:24:46.825603 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Feb 12 20:24:46.825682 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Feb 12 20:24:46.825758 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Feb 12 20:24:46.825828 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 20:24:46.825906 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 20:24:46.825977 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 20:24:46.826050 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Feb 12 20:24:46.826122 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Feb 12 20:24:46.826197 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 12 20:24:46.826269 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 20:24:46.826343 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Feb 12 20:24:46.826413 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Feb 12 20:24:46.826490 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 12 20:24:46.826649 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 12 20:24:46.826723 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Feb 12 20:24:46.826793 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Feb 12 20:24:46.826865 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Feb 12 20:24:46.826875 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 20:24:46.826882 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 20:24:46.826889 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 20:24:46.826896 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 20:24:46.826902 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 20:24:46.826909 kernel: iommu: Default domain type: Translated Feb 12 20:24:46.826916 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 20:24:46.826983 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 20:24:46.827054 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 20:24:46.827123 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 20:24:46.827132 kernel: vgaarb: loaded Feb 12 20:24:46.827139 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:24:46.827146 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:24:46.827153 kernel: PTP clock support registered Feb 12 20:24:46.827160 kernel: PCI: Using ACPI for IRQ routing Feb 12 20:24:46.827166 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 20:24:46.827176 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 20:24:46.827183 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Feb 12 20:24:46.827189 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 20:24:46.827196 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 20:24:46.827203 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 20:24:46.827210 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:24:46.827216 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:24:46.827223 kernel: pnp: PnP ACPI init Feb 12 20:24:46.827309 kernel: pnp 00:02: [dma 2] Feb 12 20:24:46.827322 kernel: pnp: PnP ACPI: found 6 devices Feb 12 20:24:46.827329 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 20:24:46.827336 kernel: NET: Registered PF_INET protocol family Feb 12 20:24:46.827343 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 20:24:46.827350 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 20:24:46.827357 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:24:46.827364 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 20:24:46.827371 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 20:24:46.827379 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 20:24:46.827386 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 20:24:46.827393 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 20:24:46.827400 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:24:46.827407 kernel: NET: Registered PF_XDP protocol family Feb 12 20:24:46.827469 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 20:24:46.827534 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 20:24:46.827639 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 20:24:46.827706 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 12 20:24:46.827773 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 20:24:46.827859 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 20:24:46.827929 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 20:24:46.828006 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 20:24:46.828021 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:24:46.828028 kernel: Initialise system trusted keyrings Feb 12 20:24:46.828035 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 20:24:46.828042 kernel: Key type asymmetric registered Feb 12 20:24:46.828051 kernel: Asymmetric key parser 'x509' registered Feb 12 20:24:46.828058 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:24:46.828065 kernel: io scheduler mq-deadline registered Feb 12 20:24:46.828072 kernel: io scheduler kyber registered Feb 12 20:24:46.828079 kernel: io scheduler bfq registered Feb 12 20:24:46.828092 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 20:24:46.828104 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 20:24:46.828111 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 20:24:46.828118 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 20:24:46.828126 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:24:46.828132 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 20:24:46.828139 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 20:24:46.828146 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 20:24:46.828153 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 20:24:46.828250 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 12 20:24:46.828261 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 20:24:46.828337 kernel: rtc_cmos 00:05: registered as rtc0 Feb 12 20:24:46.828418 kernel: rtc_cmos 00:05: setting system clock to 2024-02-12T20:24:46 UTC (1707769486) Feb 12 20:24:46.828497 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 12 20:24:46.828507 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:24:46.828514 kernel: Segment Routing with IPv6 Feb 12 20:24:46.828521 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:24:46.828528 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:24:46.828534 kernel: Key type dns_resolver registered Feb 12 20:24:46.828541 kernel: IPI shorthand broadcast: enabled Feb 12 20:24:46.828582 kernel: sched_clock: Marking stable (345367475, 74055905)->(444019644, -24596264) Feb 12 20:24:46.828592 kernel: registered taskstats version 1 Feb 12 20:24:46.828599 kernel: Loading compiled-in X.509 certificates Feb 12 20:24:46.828606 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 20:24:46.828625 kernel: Key type .fscrypt registered Feb 12 20:24:46.828636 kernel: Key type fscrypt-provisioning registered Feb 12 20:24:46.828643 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 20:24:46.828650 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:24:46.828657 kernel: ima: No architecture policies found Feb 12 20:24:46.828665 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 20:24:46.828672 kernel: Write protecting the kernel read-only data: 28672k Feb 12 20:24:46.828679 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 20:24:46.828686 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 20:24:46.828693 kernel: Run /init as init process Feb 12 20:24:46.828699 kernel: with arguments: Feb 12 20:24:46.828706 kernel: /init Feb 12 20:24:46.828713 kernel: with environment: Feb 12 20:24:46.828728 kernel: HOME=/ Feb 12 20:24:46.828735 kernel: TERM=linux Feb 12 20:24:46.828743 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:24:46.828753 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:24:46.828773 systemd[1]: Detected virtualization kvm. Feb 12 20:24:46.828781 systemd[1]: Detected architecture x86-64. Feb 12 20:24:46.828788 systemd[1]: Running in initrd. Feb 12 20:24:46.828796 systemd[1]: No hostname configured, using default hostname. Feb 12 20:24:46.828803 systemd[1]: Hostname set to . Feb 12 20:24:46.828812 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:24:46.828820 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:24:46.828827 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:24:46.828835 systemd[1]: Reached target cryptsetup.target. Feb 12 20:24:46.828842 systemd[1]: Reached target paths.target. Feb 12 20:24:46.828849 systemd[1]: Reached target slices.target. Feb 12 20:24:46.828857 systemd[1]: Reached target swap.target. Feb 12 20:24:46.828864 systemd[1]: Reached target timers.target. Feb 12 20:24:46.828874 systemd[1]: Listening on iscsid.socket. Feb 12 20:24:46.828891 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:24:46.828899 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:24:46.828907 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:24:46.828915 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:24:46.828922 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:24:46.828930 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:24:46.828938 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:24:46.828947 systemd[1]: Reached target sockets.target. Feb 12 20:24:46.828956 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:24:46.828966 systemd[1]: Finished network-cleanup.service. Feb 12 20:24:46.828974 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:24:46.828981 systemd[1]: Starting systemd-journald.service... Feb 12 20:24:46.828989 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:24:46.828998 systemd[1]: Starting systemd-resolved.service... Feb 12 20:24:46.829005 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:24:46.829013 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:24:46.829021 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:24:46.829035 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:24:46.829048 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:24:46.829058 systemd-journald[197]: Journal started Feb 12 20:24:46.829098 systemd-journald[197]: Runtime Journal (/run/log/journal/8ca8a03fcd424c918c7baec9ebaabd25) is 6.0M, max 48.5M, 42.5M free. Feb 12 20:24:46.819870 systemd-modules-load[198]: Inserted module 'overlay' Feb 12 20:24:46.853728 systemd[1]: Started systemd-journald.service. Feb 12 20:24:46.853763 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:24:46.853781 kernel: Bridge firewalling registered Feb 12 20:24:46.853795 kernel: audit: type=1130 audit(1707769486.853:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.840987 systemd-resolved[199]: Positive Trust Anchors: Feb 12 20:24:46.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.840999 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:24:46.860723 kernel: audit: type=1130 audit(1707769486.856:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.841037 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:24:46.868108 kernel: SCSI subsystem initialized Feb 12 20:24:46.868125 kernel: audit: type=1130 audit(1707769486.861:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.843778 systemd-resolved[199]: Defaulting to hostname 'linux'. Feb 12 20:24:46.846851 systemd-modules-load[198]: Inserted module 'br_netfilter' Feb 12 20:24:46.853895 systemd[1]: Started systemd-resolved.service. Feb 12 20:24:46.857096 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:24:46.861873 systemd[1]: Reached target nss-lookup.target. Feb 12 20:24:46.868949 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:24:46.875416 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:24:46.875430 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:24:46.875439 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:24:46.877912 systemd-modules-load[198]: Inserted module 'dm_multipath' Feb 12 20:24:46.878449 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:24:46.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.879463 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:24:46.883026 kernel: audit: type=1130 audit(1707769486.878:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.883974 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:24:46.887846 kernel: audit: type=1130 audit(1707769486.884:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.886951 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:24:46.888496 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:24:46.892872 kernel: audit: type=1130 audit(1707769486.888:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.896564 dracut-cmdline[222]: dracut-dracut-053 Feb 12 20:24:46.898000 dracut-cmdline[222]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:24:46.943580 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:24:46.953587 kernel: iscsi: registered transport (tcp) Feb 12 20:24:46.971658 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:24:46.971699 kernel: QLogic iSCSI HBA Driver Feb 12 20:24:46.992591 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:24:46.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:46.995153 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:24:46.997419 kernel: audit: type=1130 audit(1707769486.993:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:47.038570 kernel: raid6: avx2x4 gen() 30906 MB/s Feb 12 20:24:47.055576 kernel: raid6: avx2x4 xor() 7911 MB/s Feb 12 20:24:47.072567 kernel: raid6: avx2x2 gen() 32447 MB/s Feb 12 20:24:47.089568 kernel: raid6: avx2x2 xor() 19343 MB/s Feb 12 20:24:47.106565 kernel: raid6: avx2x1 gen() 26724 MB/s Feb 12 20:24:47.123564 kernel: raid6: avx2x1 xor() 15416 MB/s Feb 12 20:24:47.140568 kernel: raid6: sse2x4 gen() 14570 MB/s Feb 12 20:24:47.157567 kernel: raid6: sse2x4 xor() 7278 MB/s Feb 12 20:24:47.174565 kernel: raid6: sse2x2 gen() 16457 MB/s Feb 12 20:24:47.191567 kernel: raid6: sse2x2 xor() 9867 MB/s Feb 12 20:24:47.208566 kernel: raid6: sse2x1 gen() 12099 MB/s Feb 12 20:24:47.226000 kernel: raid6: sse2x1 xor() 7839 MB/s Feb 12 20:24:47.226020 kernel: raid6: using algorithm avx2x2 gen() 32447 MB/s Feb 12 20:24:47.226033 kernel: raid6: .... xor() 19343 MB/s, rmw enabled Feb 12 20:24:47.226045 kernel: raid6: using avx2x2 recovery algorithm Feb 12 20:24:47.237569 kernel: xor: automatically using best checksumming function avx Feb 12 20:24:47.323576 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 20:24:47.331959 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:24:47.335867 kernel: audit: type=1130 audit(1707769487.332:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:47.335892 kernel: audit: type=1334 audit(1707769487.334:10): prog-id=7 op=LOAD Feb 12 20:24:47.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:47.334000 audit: BPF prog-id=7 op=LOAD Feb 12 20:24:47.335000 audit: BPF prog-id=8 op=LOAD Feb 12 20:24:47.336131 systemd[1]: Starting systemd-udevd.service... Feb 12 20:24:47.346930 systemd-udevd[401]: Using default interface naming scheme 'v252'. Feb 12 20:24:47.350595 systemd[1]: Started systemd-udevd.service. Feb 12 20:24:47.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:47.353468 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:24:47.363807 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation Feb 12 20:24:47.385356 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:24:47.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:47.386336 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:24:47.419261 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:24:47.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:47.440572 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 20:24:47.440741 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 20:24:47.458575 kernel: libata version 3.00 loaded. Feb 12 20:24:47.458640 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 20:24:47.459569 kernel: AES CTR mode by8 optimization enabled Feb 12 20:24:47.459596 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:24:47.462771 kernel: GPT:9289727 != 19775487 Feb 12 20:24:47.462833 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:24:47.462844 kernel: GPT:9289727 != 19775487 Feb 12 20:24:47.462852 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:24:47.462867 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:24:47.462877 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 20:24:47.465578 kernel: scsi host0: ata_piix Feb 12 20:24:47.465716 kernel: scsi host1: ata_piix Feb 12 20:24:47.465822 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 12 20:24:47.465832 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 12 20:24:47.475575 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (453) Feb 12 20:24:47.484864 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:24:47.499916 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:24:47.500835 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:24:47.504403 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:24:47.508224 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:24:47.509752 systemd[1]: Starting disk-uuid.service... Feb 12 20:24:47.516953 disk-uuid[518]: Primary Header is updated. Feb 12 20:24:47.516953 disk-uuid[518]: Secondary Entries is updated. Feb 12 20:24:47.516953 disk-uuid[518]: Secondary Header is updated. Feb 12 20:24:47.520579 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:24:47.523575 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:24:47.526580 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:24:47.625581 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 12 20:24:47.625651 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 12 20:24:47.657594 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 12 20:24:47.657873 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 20:24:47.674574 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 12 20:24:48.524589 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:24:48.524732 disk-uuid[519]: The operation has completed successfully. Feb 12 20:24:48.544307 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:24:48.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.544390 systemd[1]: Finished disk-uuid.service. Feb 12 20:24:48.553223 systemd[1]: Starting verity-setup.service... Feb 12 20:24:48.564586 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 12 20:24:48.581381 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:24:48.583082 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:24:48.584643 systemd[1]: Finished verity-setup.service. Feb 12 20:24:48.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.641590 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:24:48.641673 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:24:48.642398 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:24:48.643210 systemd[1]: Starting ignition-setup.service... Feb 12 20:24:48.645042 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:24:48.652000 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:24:48.652037 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:24:48.652049 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:24:48.659975 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:24:48.668166 systemd[1]: Finished ignition-setup.service. Feb 12 20:24:48.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.669614 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:24:48.701025 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:24:48.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.701000 audit: BPF prog-id=9 op=LOAD Feb 12 20:24:48.702762 systemd[1]: Starting systemd-networkd.service... Feb 12 20:24:48.707345 ignition[642]: Ignition 2.14.0 Feb 12 20:24:48.707357 ignition[642]: Stage: fetch-offline Feb 12 20:24:48.707430 ignition[642]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:24:48.707438 ignition[642]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:24:48.707951 ignition[642]: parsed url from cmdline: "" Feb 12 20:24:48.707955 ignition[642]: no config URL provided Feb 12 20:24:48.707960 ignition[642]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:24:48.707967 ignition[642]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:24:48.708414 ignition[642]: op(1): [started] loading QEMU firmware config module Feb 12 20:24:48.708419 ignition[642]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 20:24:48.713781 ignition[642]: op(1): [finished] loading QEMU firmware config module Feb 12 20:24:48.713812 ignition[642]: QEMU firmware config was not found. Ignoring... Feb 12 20:24:48.725051 ignition[642]: parsing config with SHA512: 846caaf3322f942721477861c2fe9426d49bf0f232d70013ea4c21889b12e0fae29f5f981b07528c90f697d7bfd164249cc962e89a480a567277c041261b212d Feb 12 20:24:48.728025 systemd-networkd[711]: lo: Link UP Feb 12 20:24:48.728033 systemd-networkd[711]: lo: Gained carrier Feb 12 20:24:48.728772 systemd-networkd[711]: Enumeration completed Feb 12 20:24:48.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.728896 systemd[1]: Started systemd-networkd.service. Feb 12 20:24:48.729219 systemd-networkd[711]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:24:48.729314 systemd[1]: Reached target network.target. Feb 12 20:24:48.730529 systemd-networkd[711]: eth0: Link UP Feb 12 20:24:48.730532 systemd-networkd[711]: eth0: Gained carrier Feb 12 20:24:48.732493 systemd[1]: Starting iscsiuio.service... Feb 12 20:24:48.736588 systemd[1]: Started iscsiuio.service. Feb 12 20:24:48.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.737669 systemd[1]: Starting iscsid.service... Feb 12 20:24:48.740663 iscsid[718]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:24:48.740663 iscsid[718]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:24:48.740663 iscsid[718]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:24:48.740663 iscsid[718]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:24:48.740663 iscsid[718]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:24:48.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.749429 iscsid[718]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:24:48.741883 systemd[1]: Started iscsid.service. Feb 12 20:24:48.742910 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:24:48.750475 systemd-networkd[711]: eth0: DHCPv4 address 10.0.0.86/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 20:24:48.754449 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:24:48.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.755893 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:24:48.756645 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:24:48.757977 systemd[1]: Reached target remote-fs.target. Feb 12 20:24:48.759590 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:24:48.761171 ignition[642]: fetch-offline: fetch-offline passed Feb 12 20:24:48.760681 unknown[642]: fetched base config from "system" Feb 12 20:24:48.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.761227 ignition[642]: Ignition finished successfully Feb 12 20:24:48.760688 unknown[642]: fetched user config from "qemu" Feb 12 20:24:48.762190 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:24:48.762471 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 20:24:48.763166 systemd[1]: Starting ignition-kargs.service... Feb 12 20:24:48.773086 ignition[728]: Ignition 2.14.0 Feb 12 20:24:48.773098 ignition[728]: Stage: kargs Feb 12 20:24:48.773204 ignition[728]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:24:48.773216 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:24:48.774117 ignition[728]: kargs: kargs passed Feb 12 20:24:48.774153 ignition[728]: Ignition finished successfully Feb 12 20:24:48.775844 systemd[1]: Finished ignition-kargs.service. Feb 12 20:24:48.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.777715 systemd[1]: Starting ignition-disks.service... Feb 12 20:24:48.778898 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:24:48.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.784046 ignition[738]: Ignition 2.14.0 Feb 12 20:24:48.784054 ignition[738]: Stage: disks Feb 12 20:24:48.784132 ignition[738]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:24:48.784140 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:24:48.785000 ignition[738]: disks: disks passed Feb 12 20:24:48.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.785897 systemd[1]: Finished ignition-disks.service. Feb 12 20:24:48.785030 ignition[738]: Ignition finished successfully Feb 12 20:24:48.786181 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:24:48.787797 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:24:48.788791 systemd[1]: Reached target local-fs.target. Feb 12 20:24:48.789008 systemd[1]: Reached target sysinit.target. Feb 12 20:24:48.789240 systemd[1]: Reached target basic.target. Feb 12 20:24:48.792356 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:24:48.804776 systemd-fsck[746]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 20:24:48.810450 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:24:48.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.813088 systemd[1]: Mounting sysroot.mount... Feb 12 20:24:48.820581 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:24:48.820808 systemd[1]: Mounted sysroot.mount. Feb 12 20:24:48.821810 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:24:48.823099 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:24:48.823742 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:24:48.823778 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:24:48.823800 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:24:48.829770 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:24:48.831372 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:24:48.836983 initrd-setup-root[756]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:24:48.840682 initrd-setup-root[764]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:24:48.843952 initrd-setup-root[772]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:24:48.847502 initrd-setup-root[780]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:24:48.872361 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:24:48.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.874259 systemd[1]: Starting ignition-mount.service... Feb 12 20:24:48.875187 systemd[1]: Starting sysroot-boot.service... Feb 12 20:24:48.880837 bash[798]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 20:24:48.887929 ignition[799]: INFO : Ignition 2.14.0 Feb 12 20:24:48.887929 ignition[799]: INFO : Stage: mount Feb 12 20:24:48.889186 ignition[799]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:24:48.889186 ignition[799]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:24:48.889186 ignition[799]: INFO : mount: mount passed Feb 12 20:24:48.889186 ignition[799]: INFO : Ignition finished successfully Feb 12 20:24:48.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:48.889482 systemd[1]: Finished ignition-mount.service. Feb 12 20:24:48.895918 systemd[1]: Finished sysroot-boot.service. Feb 12 20:24:48.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:49.075587 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.86 Feb 12 20:24:49.075601 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux10'. Feb 12 20:24:49.593546 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:24:49.599578 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (807) Feb 12 20:24:49.599621 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:24:49.601013 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:24:49.601032 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:24:49.603709 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:24:49.604719 systemd[1]: Starting ignition-files.service... Feb 12 20:24:49.618031 ignition[827]: INFO : Ignition 2.14.0 Feb 12 20:24:49.618031 ignition[827]: INFO : Stage: files Feb 12 20:24:49.619787 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:24:49.619787 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:24:49.619787 ignition[827]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:24:49.623021 ignition[827]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:24:49.623021 ignition[827]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:24:49.623021 ignition[827]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:24:49.623021 ignition[827]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:24:49.623021 ignition[827]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:24:49.622829 unknown[827]: wrote ssh authorized keys file for user: core Feb 12 20:24:49.629648 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 20:24:49.629648 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 20:24:49.871729 systemd-networkd[711]: eth0: Gained IPv6LL Feb 12 20:24:49.982511 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 20:24:50.141440 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 20:24:50.143770 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 20:24:50.143770 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 20:24:50.143770 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 20:24:50.417898 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 20:24:50.519181 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 20:24:50.521329 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 20:24:50.521329 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:24:50.521329 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 20:24:50.591969 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 20:24:50.870945 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 20:24:50.870945 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:24:50.875732 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:24:50.875732 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 20:24:50.920928 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 20:24:51.567742 ignition[827]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 20:24:51.569996 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:24:51.569996 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:24:51.569996 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:24:51.569996 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:24:51.569996 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:24:51.569996 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:24:51.569996 ignition[827]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(a): [started] processing unit "coreos-metadata.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(a): op(b): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(a): op(b): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(a): [finished] processing unit "coreos-metadata.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(c): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(c): op(d): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(c): op(d): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(c): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(e): [started] processing unit "prepare-critools.service" Feb 12 20:24:51.569996 ignition[827]: INFO : files: op(e): op(f): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:24:51.593664 ignition[827]: INFO : files: op(e): op(f): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:24:51.593664 ignition[827]: INFO : files: op(e): [finished] processing unit "prepare-critools.service" Feb 12 20:24:51.593664 ignition[827]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 20:24:51.593664 ignition[827]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 20:24:51.593664 ignition[827]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 20:24:51.603699 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 20:24:51.603724 kernel: audit: type=1130 audit(1707769491.596:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.603806 ignition[827]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 20:24:51.603806 ignition[827]: INFO : files: op(12): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:24:51.603806 ignition[827]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:24:51.603806 ignition[827]: INFO : files: op(13): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:24:51.603806 ignition[827]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:24:51.603806 ignition[827]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:24:51.603806 ignition[827]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:24:51.603806 ignition[827]: INFO : files: files passed Feb 12 20:24:51.603806 ignition[827]: INFO : Ignition finished successfully Feb 12 20:24:51.622173 kernel: audit: type=1130 audit(1707769491.605:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.622195 kernel: audit: type=1131 audit(1707769491.605:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.622205 kernel: audit: type=1130 audit(1707769491.613:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.595577 systemd[1]: Finished ignition-files.service. Feb 12 20:24:51.597655 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:24:51.623972 initrd-setup-root-after-ignition[852]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 20:24:51.601005 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:24:51.626299 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:24:51.601876 systemd[1]: Starting ignition-quench.service... Feb 12 20:24:51.604931 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:24:51.605021 systemd[1]: Finished ignition-quench.service. Feb 12 20:24:51.607962 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:24:51.613368 systemd[1]: Reached target ignition-complete.target. Feb 12 20:24:51.617808 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:24:51.632830 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:24:51.632919 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:24:51.639247 kernel: audit: type=1130 audit(1707769491.633:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.639264 kernel: audit: type=1131 audit(1707769491.633:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.634434 systemd[1]: Reached target initrd-fs.target. Feb 12 20:24:51.639349 systemd[1]: Reached target initrd.target. Feb 12 20:24:51.640786 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:24:51.641861 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:24:51.654169 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:24:51.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.656113 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:24:51.658213 kernel: audit: type=1130 audit(1707769491.654:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.665216 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:24:51.665907 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:24:51.666975 systemd[1]: Stopped target timers.target. Feb 12 20:24:51.668033 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:24:51.672300 kernel: audit: type=1131 audit(1707769491.668:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.668120 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:24:51.669142 systemd[1]: Stopped target initrd.target. Feb 12 20:24:51.672390 systemd[1]: Stopped target basic.target. Feb 12 20:24:51.673442 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:24:51.674522 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:24:51.675589 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:24:51.676721 systemd[1]: Stopped target remote-fs.target. Feb 12 20:24:51.677807 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:24:51.678937 systemd[1]: Stopped target sysinit.target. Feb 12 20:24:51.679965 systemd[1]: Stopped target local-fs.target. Feb 12 20:24:51.681011 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:24:51.682047 systemd[1]: Stopped target swap.target. Feb 12 20:24:51.686944 kernel: audit: type=1131 audit(1707769491.684:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.683013 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:24:51.683097 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:24:51.691144 kernel: audit: type=1131 audit(1707769491.687:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.684166 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:24:51.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.686987 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:24:51.687068 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:24:51.688251 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:24:51.688351 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:24:51.691316 systemd[1]: Stopped target paths.target. Feb 12 20:24:51.692487 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:24:51.694662 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:24:51.695757 systemd[1]: Stopped target slices.target. Feb 12 20:24:51.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.696657 systemd[1]: Stopped target sockets.target. Feb 12 20:24:51.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.697884 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:24:51.698003 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:24:51.702535 iscsid[718]: iscsid shutting down. Feb 12 20:24:51.699144 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:24:51.699226 systemd[1]: Stopped ignition-files.service. Feb 12 20:24:51.700946 systemd[1]: Stopping ignition-mount.service... Feb 12 20:24:51.704475 systemd[1]: Stopping iscsid.service... Feb 12 20:24:51.705462 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:24:51.705641 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:24:51.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.707714 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:24:51.712102 ignition[868]: INFO : Ignition 2.14.0 Feb 12 20:24:51.712102 ignition[868]: INFO : Stage: umount Feb 12 20:24:51.712102 ignition[868]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:24:51.712102 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:24:51.712102 ignition[868]: INFO : umount: umount passed Feb 12 20:24:51.712102 ignition[868]: INFO : Ignition finished successfully Feb 12 20:24:51.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.708331 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:24:51.708519 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:24:51.709250 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:24:51.709337 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:24:51.711903 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:24:51.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.711983 systemd[1]: Stopped iscsid.service. Feb 12 20:24:51.713226 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:24:51.713331 systemd[1]: Stopped ignition-mount.service. Feb 12 20:24:51.714863 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:24:51.714968 systemd[1]: Closed iscsid.socket. Feb 12 20:24:51.715890 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:24:51.715936 systemd[1]: Stopped ignition-disks.service. Feb 12 20:24:51.717267 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:24:51.717306 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:24:51.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.718457 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:24:51.718512 systemd[1]: Stopped ignition-setup.service. Feb 12 20:24:51.721645 systemd[1]: Stopping iscsiuio.service... Feb 12 20:24:51.722509 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:24:51.722609 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:24:51.723526 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:24:51.723606 systemd[1]: Stopped iscsiuio.service. Feb 12 20:24:51.725356 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:24:51.726429 systemd[1]: Stopped target network.target. Feb 12 20:24:51.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.727545 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:24:51.727666 systemd[1]: Closed iscsiuio.socket. Feb 12 20:24:51.728584 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:24:51.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.729788 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:24:51.730901 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:24:51.731004 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:24:51.731948 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:24:51.731990 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:24:51.744000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:24:51.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.735673 systemd-networkd[711]: eth0: DHCPv6 lease lost Feb 12 20:24:51.746000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:24:51.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.737206 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:24:51.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.737350 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:24:51.740090 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:24:51.740200 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:24:51.742648 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:24:51.742688 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:24:51.744611 systemd[1]: Stopping network-cleanup.service... Feb 12 20:24:51.745479 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:24:51.745540 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:24:51.746757 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:24:51.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.746804 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:24:51.747952 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:24:51.747999 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:24:51.748775 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:24:51.751029 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:24:51.755086 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:24:51.755195 systemd[1]: Stopped network-cleanup.service. Feb 12 20:24:51.761468 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:24:51.761650 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:24:51.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.763560 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:24:51.763614 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:24:51.764922 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:24:51.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.764950 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:24:51.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.766081 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:24:51.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.766117 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:24:51.767373 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:24:51.767403 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:24:51.768525 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:24:51.768567 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:24:51.773411 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:24:51.774627 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:24:51.774664 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:24:51.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.778648 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:24:51.779420 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:24:51.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:51.780808 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:24:51.782612 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:24:51.796718 systemd[1]: Switching root. Feb 12 20:24:51.818840 systemd-journald[197]: Journal stopped Feb 12 20:24:54.890781 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Feb 12 20:24:54.890830 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:24:54.890842 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:24:54.890851 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:24:54.890863 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:24:54.890872 kernel: SELinux: policy capability open_perms=1 Feb 12 20:24:54.890882 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:24:54.890891 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:24:54.890900 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:24:54.890910 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:24:54.890924 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:24:54.890933 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:24:54.890942 systemd[1]: Successfully loaded SELinux policy in 46.869ms. Feb 12 20:24:54.890966 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.316ms. Feb 12 20:24:54.890977 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:24:54.890987 systemd[1]: Detected virtualization kvm. Feb 12 20:24:54.891001 systemd[1]: Detected architecture x86-64. Feb 12 20:24:54.891011 systemd[1]: Detected first boot. Feb 12 20:24:54.891021 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:24:54.891030 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:24:54.891040 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:24:54.891056 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:24:54.891067 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:24:54.891078 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:24:54.891092 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:24:54.891102 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:24:54.891112 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:24:54.891122 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:24:54.891132 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:24:54.891144 systemd[1]: Created slice system-getty.slice. Feb 12 20:24:54.891154 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:24:54.891165 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:24:54.891175 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:24:54.891185 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:24:54.891195 systemd[1]: Created slice user.slice. Feb 12 20:24:54.891204 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:24:54.891214 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:24:54.891224 systemd[1]: Set up automount boot.automount. Feb 12 20:24:54.891235 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:24:54.891245 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:24:54.891256 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:24:54.891265 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:24:54.891275 systemd[1]: Reached target integritysetup.target. Feb 12 20:24:54.891285 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:24:54.891295 systemd[1]: Reached target remote-fs.target. Feb 12 20:24:54.891305 systemd[1]: Reached target slices.target. Feb 12 20:24:54.891316 systemd[1]: Reached target swap.target. Feb 12 20:24:54.891326 systemd[1]: Reached target torcx.target. Feb 12 20:24:54.891336 systemd[1]: Reached target veritysetup.target. Feb 12 20:24:54.891347 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:24:54.891357 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:24:54.891367 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:24:54.891377 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:24:54.891387 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:24:54.891398 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:24:54.891418 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:24:54.891429 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:24:54.891439 systemd[1]: Mounting media.mount... Feb 12 20:24:54.891448 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:24:54.891459 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:24:54.891469 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:24:54.891479 systemd[1]: Mounting tmp.mount... Feb 12 20:24:54.891493 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:24:54.891504 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:24:54.891515 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:24:54.891525 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:24:54.891534 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:24:54.891545 systemd[1]: Starting modprobe@drm.service... Feb 12 20:24:54.891565 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:24:54.891575 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:24:54.891585 systemd[1]: Starting modprobe@loop.service... Feb 12 20:24:54.891595 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:24:54.891605 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:24:54.891617 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:24:54.891627 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:24:54.891637 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:24:54.891647 systemd[1]: Stopped systemd-journald.service. Feb 12 20:24:54.891657 kernel: loop: module loaded Feb 12 20:24:54.891666 kernel: fuse: init (API version 7.34) Feb 12 20:24:54.891676 systemd[1]: Starting systemd-journald.service... Feb 12 20:24:54.891686 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:24:54.891696 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:24:54.891708 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:24:54.891718 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:24:54.891728 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:24:54.891738 systemd[1]: Stopped verity-setup.service. Feb 12 20:24:54.891748 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:24:54.891758 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:24:54.891768 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:24:54.891781 systemd-journald[974]: Journal started Feb 12 20:24:54.891816 systemd-journald[974]: Runtime Journal (/run/log/journal/8ca8a03fcd424c918c7baec9ebaabd25) is 6.0M, max 48.5M, 42.5M free. Feb 12 20:24:54.891845 systemd[1]: Mounted media.mount. Feb 12 20:24:51.887000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:24:52.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:24:52.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:24:52.375000 audit: BPF prog-id=10 op=LOAD Feb 12 20:24:52.375000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:24:52.375000 audit: BPF prog-id=11 op=LOAD Feb 12 20:24:52.375000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:24:52.407000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:24:52.407000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:52.407000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:24:52.408000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:24:52.408000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018f9b5 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:52.408000 audit: CWD cwd="/" Feb 12 20:24:52.408000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:52.408000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:52.408000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:24:54.786000 audit: BPF prog-id=12 op=LOAD Feb 12 20:24:54.786000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:24:54.786000 audit: BPF prog-id=13 op=LOAD Feb 12 20:24:54.786000 audit: BPF prog-id=14 op=LOAD Feb 12 20:24:54.786000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:24:54.786000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:24:54.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.799000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:24:54.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.871000 audit: BPF prog-id=15 op=LOAD Feb 12 20:24:54.872000 audit: BPF prog-id=16 op=LOAD Feb 12 20:24:54.872000 audit: BPF prog-id=17 op=LOAD Feb 12 20:24:54.872000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:24:54.872000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:24:54.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.889000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:24:54.889000 audit[974]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe8023fd30 a2=4000 a3=7ffe8023fdcc items=0 ppid=1 pid=974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:54.889000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:24:54.784880 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:24:52.406054 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:24:54.784890 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 20:24:52.406257 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:24:54.787456 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:24:52.406280 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:24:52.406305 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:24:52.406314 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:24:52.406340 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:24:52.406351 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:24:52.406535 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:24:52.406575 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:24:52.406585 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:24:52.406874 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:24:54.893779 systemd[1]: Started systemd-journald.service. Feb 12 20:24:52.406902 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:24:52.406917 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:24:54.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:52.406929 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:24:52.406943 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:24:52.406955 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:52Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:24:54.532405 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:54Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:24:54.532659 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:54Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:24:54.894258 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:24:54.532750 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:54Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:24:54.532894 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:54Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:24:54.532937 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:54Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:24:54.532989 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-02-12T20:24:54Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:24:54.895105 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:24:54.895747 systemd[1]: Mounted tmp.mount. Feb 12 20:24:54.896442 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:24:54.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.897238 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:24:54.897398 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:24:54.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.898182 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:24:54.898373 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:24:54.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.899171 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:24:54.899326 systemd[1]: Finished modprobe@drm.service. Feb 12 20:24:54.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.900189 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:24:54.900350 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:24:54.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.901145 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:24:54.901269 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:24:54.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.902080 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:24:54.902248 systemd[1]: Finished modprobe@loop.service. Feb 12 20:24:54.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.903137 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:24:54.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.904027 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:24:54.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.904893 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:24:54.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.905795 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:24:54.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.906922 systemd[1]: Reached target network-pre.target. Feb 12 20:24:54.908486 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:24:54.909992 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:24:54.910534 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:24:54.912503 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:24:54.913952 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:24:54.914681 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:24:54.915455 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:24:54.916083 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:24:54.916907 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:24:54.918387 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:24:54.919067 systemd-journald[974]: Time spent on flushing to /var/log/journal/8ca8a03fcd424c918c7baec9ebaabd25 is 13.621ms for 1101 entries. Feb 12 20:24:54.919067 systemd-journald[974]: System Journal (/var/log/journal/8ca8a03fcd424c918c7baec9ebaabd25) is 8.0M, max 195.6M, 187.6M free. Feb 12 20:24:54.945381 systemd-journald[974]: Received client request to flush runtime journal. Feb 12 20:24:54.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.921920 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:24:54.922693 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:24:54.928393 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:24:54.929140 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:24:54.929977 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:24:54.940757 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:24:54.941691 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:24:54.943286 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:24:54.946183 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:24:54.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:54.949959 udevadm[1006]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 20:24:55.350022 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:24:55.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.352000 audit: BPF prog-id=18 op=LOAD Feb 12 20:24:55.352000 audit: BPF prog-id=19 op=LOAD Feb 12 20:24:55.352000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:24:55.352000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:24:55.353740 systemd[1]: Starting systemd-udevd.service... Feb 12 20:24:55.369924 systemd-udevd[1007]: Using default interface naming scheme 'v252'. Feb 12 20:24:55.383385 systemd[1]: Started systemd-udevd.service. Feb 12 20:24:55.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.384000 audit: BPF prog-id=20 op=LOAD Feb 12 20:24:55.385991 systemd[1]: Starting systemd-networkd.service... Feb 12 20:24:55.391000 audit: BPF prog-id=21 op=LOAD Feb 12 20:24:55.391000 audit: BPF prog-id=22 op=LOAD Feb 12 20:24:55.391000 audit: BPF prog-id=23 op=LOAD Feb 12 20:24:55.392781 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:24:55.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.423003 systemd[1]: Started systemd-userdbd.service. Feb 12 20:24:55.432910 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:24:55.448493 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:24:55.461000 audit[1026]: AVC avc: denied { confidentiality } for pid=1026 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 20:24:55.465948 systemd-networkd[1013]: lo: Link UP Feb 12 20:24:55.465965 systemd-networkd[1013]: lo: Gained carrier Feb 12 20:24:55.466472 systemd-networkd[1013]: Enumeration completed Feb 12 20:24:55.466623 systemd[1]: Started systemd-networkd.service. Feb 12 20:24:55.467581 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 20:24:55.467454 systemd-networkd[1013]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:24:55.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.468899 systemd-networkd[1013]: eth0: Link UP Feb 12 20:24:55.468990 systemd-networkd[1013]: eth0: Gained carrier Feb 12 20:24:55.472601 kernel: ACPI: button: Power Button [PWRF] Feb 12 20:24:55.461000 audit[1026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558a76e3e7c0 a1=32194 a2=7f2038f64bc5 a3=5 items=108 ppid=1007 pid=1026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:55.461000 audit: CWD cwd="/" Feb 12 20:24:55.461000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=1 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=2 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=3 name=(null) inode=14208 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=4 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=5 name=(null) inode=14209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=6 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=7 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=8 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=9 name=(null) inode=14211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=10 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=11 name=(null) inode=14212 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=12 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=13 name=(null) inode=14213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=14 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=15 name=(null) inode=14214 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=16 name=(null) inode=14210 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=17 name=(null) inode=14215 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=18 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=19 name=(null) inode=14216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=20 name=(null) inode=14216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=21 name=(null) inode=14217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=22 name=(null) inode=14216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=23 name=(null) inode=14218 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=24 name=(null) inode=14216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=25 name=(null) inode=14219 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=26 name=(null) inode=14216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=27 name=(null) inode=14220 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=28 name=(null) inode=14216 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=29 name=(null) inode=14221 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=30 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=31 name=(null) inode=14222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=32 name=(null) inode=14222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=33 name=(null) inode=14223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=34 name=(null) inode=14222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=35 name=(null) inode=14224 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=36 name=(null) inode=14222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=37 name=(null) inode=14225 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=38 name=(null) inode=14222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=39 name=(null) inode=14226 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=40 name=(null) inode=14222 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=41 name=(null) inode=14227 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=42 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=43 name=(null) inode=14228 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=44 name=(null) inode=14228 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=45 name=(null) inode=14229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=46 name=(null) inode=14228 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=47 name=(null) inode=14230 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=48 name=(null) inode=14228 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=49 name=(null) inode=14231 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=50 name=(null) inode=14228 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=51 name=(null) inode=14232 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=52 name=(null) inode=14228 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=53 name=(null) inode=14233 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=55 name=(null) inode=14234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=56 name=(null) inode=14234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=57 name=(null) inode=14235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=58 name=(null) inode=14234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=59 name=(null) inode=14236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=60 name=(null) inode=14234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=61 name=(null) inode=14237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=62 name=(null) inode=14237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=63 name=(null) inode=14238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=64 name=(null) inode=14237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=65 name=(null) inode=14239 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=66 name=(null) inode=14237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=67 name=(null) inode=14240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=68 name=(null) inode=14237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=69 name=(null) inode=14241 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=70 name=(null) inode=14237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=71 name=(null) inode=14242 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=72 name=(null) inode=14234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=73 name=(null) inode=14243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=74 name=(null) inode=14243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=75 name=(null) inode=14244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=76 name=(null) inode=14243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=77 name=(null) inode=14245 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=78 name=(null) inode=14243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=79 name=(null) inode=14246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=80 name=(null) inode=14243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=81 name=(null) inode=14247 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=82 name=(null) inode=14243 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=83 name=(null) inode=14248 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=84 name=(null) inode=14234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=85 name=(null) inode=14249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=86 name=(null) inode=14249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=87 name=(null) inode=14250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=88 name=(null) inode=14249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=89 name=(null) inode=14251 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=90 name=(null) inode=14249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=91 name=(null) inode=14252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=92 name=(null) inode=14249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=93 name=(null) inode=14253 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=94 name=(null) inode=14249 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=95 name=(null) inode=14254 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=96 name=(null) inode=14234 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=97 name=(null) inode=14255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=98 name=(null) inode=14255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=99 name=(null) inode=14256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=100 name=(null) inode=14255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=101 name=(null) inode=14257 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=102 name=(null) inode=14255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=103 name=(null) inode=14258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=104 name=(null) inode=14255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=105 name=(null) inode=14259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=106 name=(null) inode=14255 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PATH item=107 name=(null) inode=14260 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:24:55.461000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 20:24:55.482700 systemd-networkd[1013]: eth0: DHCPv4 address 10.0.0.86/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 20:24:55.486577 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 20:24:55.486820 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 20:24:55.515573 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 20:24:55.570959 kernel: kvm: Nested Virtualization enabled Feb 12 20:24:55.571071 kernel: SVM: kvm: Nested Paging enabled Feb 12 20:24:55.571086 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 12 20:24:55.571784 kernel: SVM: Virtual GIF supported Feb 12 20:24:55.590587 kernel: EDAC MC: Ver: 3.0.0 Feb 12 20:24:55.611045 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:24:55.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.613288 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:24:55.620380 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:24:55.645571 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:24:55.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.646452 systemd[1]: Reached target cryptsetup.target. Feb 12 20:24:55.648131 systemd[1]: Starting lvm2-activation.service... Feb 12 20:24:55.651619 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:24:55.679662 systemd[1]: Finished lvm2-activation.service. Feb 12 20:24:55.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.680808 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:24:55.681627 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:24:55.681658 systemd[1]: Reached target local-fs.target. Feb 12 20:24:55.682412 systemd[1]: Reached target machines.target. Feb 12 20:24:55.684473 systemd[1]: Starting ldconfig.service... Feb 12 20:24:55.685518 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:24:55.685583 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:24:55.686689 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:24:55.688380 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:24:55.691335 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:24:55.693041 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:24:55.693255 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:24:55.696221 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:24:55.697125 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1045 (bootctl) Feb 12 20:24:55.698331 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:24:55.705254 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:24:55.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.712088 systemd-tmpfiles[1049]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:24:55.714215 systemd-tmpfiles[1049]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:24:55.717115 systemd-tmpfiles[1049]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:24:55.735794 systemd-fsck[1053]: fsck.fat 4.2 (2021-01-31) Feb 12 20:24:55.735794 systemd-fsck[1053]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 20:24:55.737847 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:24:55.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.741087 systemd[1]: Mounting boot.mount... Feb 12 20:24:55.983535 systemd[1]: Mounted boot.mount. Feb 12 20:24:55.996060 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:24:55.996687 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:24:55.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:55.997976 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:24:55.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.043729 ldconfig[1044]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:24:56.049861 systemd[1]: Finished ldconfig.service. Feb 12 20:24:56.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.063980 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:24:56.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.066061 systemd[1]: Starting audit-rules.service... Feb 12 20:24:56.067424 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:24:56.069000 audit: BPF prog-id=24 op=LOAD Feb 12 20:24:56.071000 audit: BPF prog-id=25 op=LOAD Feb 12 20:24:56.068816 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:24:56.070956 systemd[1]: Starting systemd-resolved.service... Feb 12 20:24:56.073226 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:24:56.075219 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:24:56.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.077715 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:24:56.078724 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:24:56.081000 audit[1068]: SYSTEM_BOOT pid=1068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.085157 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:24:56.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.093764 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:24:56.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.095816 systemd[1]: Starting systemd-update-done.service... Feb 12 20:24:56.101882 systemd[1]: Finished systemd-update-done.service. Feb 12 20:24:56.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:56.105000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:24:56.105000 audit[1078]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe942d3fa0 a2=420 a3=0 items=0 ppid=1057 pid=1078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:56.105000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:24:56.106236 augenrules[1078]: No rules Feb 12 20:24:56.107020 systemd[1]: Finished audit-rules.service. Feb 12 20:24:56.135070 systemd-resolved[1061]: Positive Trust Anchors: Feb 12 20:24:56.135086 systemd-resolved[1061]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:24:56.135126 systemd-resolved[1061]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:24:56.142436 systemd-resolved[1061]: Defaulting to hostname 'linux'. Feb 12 20:24:56.143975 systemd[1]: Started systemd-resolved.service. Feb 12 20:24:56.144810 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:24:57.198468 systemd-timesyncd[1066]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 20:24:57.198524 systemd-timesyncd[1066]: Initial clock synchronization to Mon 2024-02-12 20:24:57.198383 UTC. Feb 12 20:24:57.198831 systemd-resolved[1061]: Clock change detected. Flushing caches. Feb 12 20:24:57.198971 systemd[1]: Reached target network.target. Feb 12 20:24:57.199571 systemd[1]: Reached target nss-lookup.target. Feb 12 20:24:57.200198 systemd[1]: Reached target sysinit.target. Feb 12 20:24:57.200914 systemd[1]: Started motdgen.path. Feb 12 20:24:57.201458 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:24:57.202329 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:24:57.203071 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:24:57.203095 systemd[1]: Reached target paths.target. Feb 12 20:24:57.203626 systemd[1]: Reached target time-set.target. Feb 12 20:24:57.204360 systemd[1]: Started logrotate.timer. Feb 12 20:24:57.205001 systemd[1]: Started mdadm.timer. Feb 12 20:24:57.205505 systemd[1]: Reached target timers.target. Feb 12 20:24:57.206452 systemd[1]: Listening on dbus.socket. Feb 12 20:24:57.208147 systemd[1]: Starting docker.socket... Feb 12 20:24:57.211226 systemd[1]: Listening on sshd.socket. Feb 12 20:24:57.212074 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:24:57.212424 systemd[1]: Listening on docker.socket. Feb 12 20:24:57.213111 systemd[1]: Reached target sockets.target. Feb 12 20:24:57.213861 systemd[1]: Reached target basic.target. Feb 12 20:24:57.214517 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:24:57.214543 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:24:57.215423 systemd[1]: Starting containerd.service... Feb 12 20:24:57.216867 systemd[1]: Starting dbus.service... Feb 12 20:24:57.218282 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:24:57.219967 systemd[1]: Starting extend-filesystems.service... Feb 12 20:24:57.220725 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:24:57.225346 jq[1088]: false Feb 12 20:24:57.221666 systemd[1]: Starting motdgen.service... Feb 12 20:24:57.223311 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:24:57.226074 systemd[1]: Starting prepare-critools.service... Feb 12 20:24:57.227748 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:24:57.229449 systemd[1]: Starting sshd-keygen.service... Feb 12 20:24:57.232446 systemd[1]: Starting systemd-logind.service... Feb 12 20:24:57.233152 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:24:57.233203 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 20:24:57.235477 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:24:57.240113 extend-filesystems[1089]: Found sr0 Feb 12 20:24:57.240113 extend-filesystems[1089]: Found vda Feb 12 20:24:57.240113 extend-filesystems[1089]: Found vda1 Feb 12 20:24:57.240113 extend-filesystems[1089]: Found vda2 Feb 12 20:24:57.240113 extend-filesystems[1089]: Found vda3 Feb 12 20:24:57.235557 dbus-daemon[1087]: [system] SELinux support is enabled Feb 12 20:24:57.236339 systemd[1]: Starting update-engine.service... Feb 12 20:24:57.259832 extend-filesystems[1089]: Found usr Feb 12 20:24:57.259832 extend-filesystems[1089]: Found vda4 Feb 12 20:24:57.259832 extend-filesystems[1089]: Found vda6 Feb 12 20:24:57.259832 extend-filesystems[1089]: Found vda7 Feb 12 20:24:57.259832 extend-filesystems[1089]: Found vda9 Feb 12 20:24:57.238059 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:24:57.275122 extend-filesystems[1089]: Checking size of /dev/vda9 Feb 12 20:24:57.276278 jq[1105]: true Feb 12 20:24:57.239616 systemd[1]: Started dbus.service. Feb 12 20:24:57.276514 update_engine[1104]: I0212 20:24:57.275389 1104 main.cc:92] Flatcar Update Engine starting Feb 12 20:24:57.242983 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:24:57.276859 tar[1110]: ./ Feb 12 20:24:57.276859 tar[1110]: ./macvlan Feb 12 20:24:57.243122 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:24:57.277088 tar[1111]: crictl Feb 12 20:24:57.243359 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:24:57.277307 env[1113]: time="2024-02-12T20:24:57.272826852Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:24:57.243475 systemd[1]: Finished motdgen.service. Feb 12 20:24:57.277565 jq[1112]: true Feb 12 20:24:57.245641 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:24:57.278383 update_engine[1104]: I0212 20:24:57.277777 1104 update_check_scheduler.cc:74] Next update check in 5m11s Feb 12 20:24:57.245813 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:24:57.251113 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:24:57.251140 systemd[1]: Reached target system-config.target. Feb 12 20:24:57.251913 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:24:57.251927 systemd[1]: Reached target user-config.target. Feb 12 20:24:57.277625 systemd[1]: Started update-engine.service. Feb 12 20:24:57.279907 systemd[1]: Started locksmithd.service. Feb 12 20:24:57.295069 systemd-logind[1102]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 20:24:57.295094 systemd-logind[1102]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 20:24:57.296580 systemd-logind[1102]: New seat seat0. Feb 12 20:24:57.303334 systemd[1]: Started systemd-logind.service. Feb 12 20:24:57.308850 extend-filesystems[1089]: Resized partition /dev/vda9 Feb 12 20:24:57.328058 env[1113]: time="2024-02-12T20:24:57.328008146Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:24:57.328246 env[1113]: time="2024-02-12T20:24:57.328221947Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:24:57.330390 tar[1110]: ./static Feb 12 20:24:57.331657 env[1113]: time="2024-02-12T20:24:57.331618789Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:24:57.331657 env[1113]: time="2024-02-12T20:24:57.331654906Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:24:57.331903 env[1113]: time="2024-02-12T20:24:57.331877484Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:24:57.331954 env[1113]: time="2024-02-12T20:24:57.331902030Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:24:57.331954 env[1113]: time="2024-02-12T20:24:57.331917409Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:24:57.331954 env[1113]: time="2024-02-12T20:24:57.331936555Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:24:57.332036 env[1113]: time="2024-02-12T20:24:57.332014741Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:24:57.332289 env[1113]: time="2024-02-12T20:24:57.332264830Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:24:57.332417 env[1113]: time="2024-02-12T20:24:57.332392800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:24:57.332417 env[1113]: time="2024-02-12T20:24:57.332415252Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:24:57.332483 env[1113]: time="2024-02-12T20:24:57.332467611Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:24:57.332505 env[1113]: time="2024-02-12T20:24:57.332480194Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:24:57.344780 extend-filesystems[1144]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:24:57.364208 tar[1110]: ./vlan Feb 12 20:24:57.400723 tar[1110]: ./portmap Feb 12 20:24:57.435280 tar[1110]: ./host-local Feb 12 20:24:57.441509 locksmithd[1141]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:24:57.444777 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 20:24:57.605977 tar[1110]: ./vrf Feb 12 20:24:57.634599 tar[1110]: ./bridge Feb 12 20:24:57.658782 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 20:24:57.741125 extend-filesystems[1144]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 20:24:57.741125 extend-filesystems[1144]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 20:24:57.741125 extend-filesystems[1144]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 20:24:57.745461 extend-filesystems[1089]: Resized filesystem in /dev/vda9 Feb 12 20:24:57.741773 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:24:57.741915 systemd[1]: Finished extend-filesystems.service. Feb 12 20:24:57.749267 bash[1140]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749127616Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749171187Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749185594Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749228665Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749245547Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749261988Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749276876Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749294419Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749309677Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749325607Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749340415Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749419 env[1113]: time="2024-02-12T20:24:57.749354551Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:24:57.749671 env[1113]: time="2024-02-12T20:24:57.749473785Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:24:57.749671 env[1113]: time="2024-02-12T20:24:57.749554326Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:24:57.749887 env[1113]: time="2024-02-12T20:24:57.749855341Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:24:57.749929 env[1113]: time="2024-02-12T20:24:57.749894614Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.749929 env[1113]: time="2024-02-12T20:24:57.749912558Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:24:57.749994 env[1113]: time="2024-02-12T20:24:57.749965878Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.749994 env[1113]: time="2024-02-12T20:24:57.749990484Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.749987 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:24:57.750117 env[1113]: time="2024-02-12T20:24:57.750006304Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750117 env[1113]: time="2024-02-12T20:24:57.750020751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750117 env[1113]: time="2024-02-12T20:24:57.750035519Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750117 env[1113]: time="2024-02-12T20:24:57.750052420Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750117 env[1113]: time="2024-02-12T20:24:57.750069893Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750117 env[1113]: time="2024-02-12T20:24:57.750084851Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750117 env[1113]: time="2024-02-12T20:24:57.750103136Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:24:57.750256 env[1113]: time="2024-02-12T20:24:57.750241976Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750282 env[1113]: time="2024-02-12T20:24:57.750263166Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750304 env[1113]: time="2024-02-12T20:24:57.750280228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750304 env[1113]: time="2024-02-12T20:24:57.750295887Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:24:57.750345 env[1113]: time="2024-02-12T20:24:57.750315424Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:24:57.750345 env[1113]: time="2024-02-12T20:24:57.750332255Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:24:57.750385 env[1113]: time="2024-02-12T20:24:57.750355669Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:24:57.750406 env[1113]: time="2024-02-12T20:24:57.750396736Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:24:57.750724 env[1113]: time="2024-02-12T20:24:57.750653828Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:24:57.751783 env[1113]: time="2024-02-12T20:24:57.750728478Z" level=info msg="Connect containerd service" Feb 12 20:24:57.751783 env[1113]: time="2024-02-12T20:24:57.750782189Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:24:57.751783 env[1113]: time="2024-02-12T20:24:57.751317784Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:24:57.751783 env[1113]: time="2024-02-12T20:24:57.751528599Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:24:57.751783 env[1113]: time="2024-02-12T20:24:57.751569266Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:24:57.751783 env[1113]: time="2024-02-12T20:24:57.751625441Z" level=info msg="containerd successfully booted in 0.479454s" Feb 12 20:24:57.751669 systemd[1]: Started containerd.service. Feb 12 20:24:57.752976 env[1113]: time="2024-02-12T20:24:57.751555760Z" level=info msg="Start subscribing containerd event" Feb 12 20:24:57.752976 env[1113]: time="2024-02-12T20:24:57.752671092Z" level=info msg="Start recovering state" Feb 12 20:24:57.752976 env[1113]: time="2024-02-12T20:24:57.752756302Z" level=info msg="Start event monitor" Feb 12 20:24:57.752976 env[1113]: time="2024-02-12T20:24:57.752797269Z" level=info msg="Start snapshots syncer" Feb 12 20:24:57.752976 env[1113]: time="2024-02-12T20:24:57.752810414Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:24:57.752976 env[1113]: time="2024-02-12T20:24:57.752819220Z" level=info msg="Start streaming server" Feb 12 20:24:57.762079 tar[1110]: ./tuning Feb 12 20:24:57.779709 sshd_keygen[1109]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:24:57.785958 tar[1110]: ./firewall Feb 12 20:24:57.796323 systemd[1]: Finished sshd-keygen.service. Feb 12 20:24:57.798322 systemd[1]: Starting issuegen.service... Feb 12 20:24:57.803229 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:24:57.803404 systemd[1]: Finished issuegen.service. Feb 12 20:24:57.805363 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:24:57.810439 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:24:57.812635 systemd[1]: Started getty@tty1.service. Feb 12 20:24:57.814427 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:24:57.815356 systemd[1]: Reached target getty.target. Feb 12 20:24:57.819852 tar[1110]: ./host-device Feb 12 20:24:57.846679 tar[1110]: ./sbr Feb 12 20:24:57.870364 tar[1110]: ./loopback Feb 12 20:24:57.892853 tar[1110]: ./dhcp Feb 12 20:24:57.900483 systemd[1]: Finished prepare-critools.service. Feb 12 20:24:57.958820 tar[1110]: ./ptp Feb 12 20:24:57.986772 tar[1110]: ./ipvlan Feb 12 20:24:58.013661 tar[1110]: ./bandwidth Feb 12 20:24:58.029931 systemd[1]: Created slice system-sshd.slice. Feb 12 20:24:58.031453 systemd[1]: Started sshd@0-10.0.0.86:22-10.0.0.1:36428.service. Feb 12 20:24:58.046636 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:24:58.047634 systemd[1]: Reached target multi-user.target. Feb 12 20:24:58.049413 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:24:58.055042 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:24:58.055165 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:24:58.055979 systemd[1]: Startup finished in 528ms (kernel) + 5.150s (initrd) + 5.163s (userspace) = 10.843s. Feb 12 20:24:58.072832 sshd[1170]: Accepted publickey for core from 10.0.0.1 port 36428 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:24:58.074265 sshd[1170]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:58.080831 systemd[1]: Created slice user-500.slice. Feb 12 20:24:58.081815 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:24:58.083194 systemd-logind[1102]: New session 1 of user core. Feb 12 20:24:58.089581 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:24:58.090654 systemd[1]: Starting user@500.service... Feb 12 20:24:58.093472 (systemd)[1177]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:58.157912 systemd[1177]: Queued start job for default target default.target. Feb 12 20:24:58.158330 systemd[1177]: Reached target paths.target. Feb 12 20:24:58.158347 systemd[1177]: Reached target sockets.target. Feb 12 20:24:58.158358 systemd[1177]: Reached target timers.target. Feb 12 20:24:58.158367 systemd[1177]: Reached target basic.target. Feb 12 20:24:58.158399 systemd[1177]: Reached target default.target. Feb 12 20:24:58.158419 systemd[1177]: Startup finished in 58ms. Feb 12 20:24:58.158507 systemd[1]: Started user@500.service. Feb 12 20:24:58.159617 systemd[1]: Started session-1.scope. Feb 12 20:24:58.209178 systemd[1]: Started sshd@1-10.0.0.86:22-10.0.0.1:36444.service. Feb 12 20:24:58.252753 sshd[1186]: Accepted publickey for core from 10.0.0.1 port 36444 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:24:58.253941 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:58.257321 systemd-logind[1102]: New session 2 of user core. Feb 12 20:24:58.258076 systemd[1]: Started session-2.scope. Feb 12 20:24:58.284868 systemd-networkd[1013]: eth0: Gained IPv6LL Feb 12 20:24:58.312048 sshd[1186]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:58.314697 systemd[1]: sshd@1-10.0.0.86:22-10.0.0.1:36444.service: Deactivated successfully. Feb 12 20:24:58.315218 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:24:58.315671 systemd-logind[1102]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:24:58.316782 systemd[1]: Started sshd@2-10.0.0.86:22-10.0.0.1:36450.service. Feb 12 20:24:58.317475 systemd-logind[1102]: Removed session 2. Feb 12 20:24:58.355253 sshd[1192]: Accepted publickey for core from 10.0.0.1 port 36450 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:24:58.356188 sshd[1192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:58.359566 systemd-logind[1102]: New session 3 of user core. Feb 12 20:24:58.360321 systemd[1]: Started session-3.scope. Feb 12 20:24:58.408814 sshd[1192]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:58.411454 systemd[1]: sshd@2-10.0.0.86:22-10.0.0.1:36450.service: Deactivated successfully. Feb 12 20:24:58.411950 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:24:58.412414 systemd-logind[1102]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:24:58.413343 systemd[1]: Started sshd@3-10.0.0.86:22-10.0.0.1:36460.service. Feb 12 20:24:58.413988 systemd-logind[1102]: Removed session 3. Feb 12 20:24:58.452173 sshd[1198]: Accepted publickey for core from 10.0.0.1 port 36460 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:24:58.453245 sshd[1198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:58.456451 systemd-logind[1102]: New session 4 of user core. Feb 12 20:24:58.457201 systemd[1]: Started session-4.scope. Feb 12 20:24:58.509951 sshd[1198]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:58.513283 systemd[1]: sshd@3-10.0.0.86:22-10.0.0.1:36460.service: Deactivated successfully. Feb 12 20:24:58.513945 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:24:58.514495 systemd-logind[1102]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:24:58.515837 systemd[1]: Started sshd@4-10.0.0.86:22-10.0.0.1:36472.service. Feb 12 20:24:58.516595 systemd-logind[1102]: Removed session 4. Feb 12 20:24:58.556544 sshd[1204]: Accepted publickey for core from 10.0.0.1 port 36472 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:24:58.557757 sshd[1204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:58.561292 systemd-logind[1102]: New session 5 of user core. Feb 12 20:24:58.562032 systemd[1]: Started session-5.scope. Feb 12 20:24:58.616193 sudo[1207]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:24:58.616349 sudo[1207]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:24:58.626000 dbus-daemon[1087]: \xd0\xdd\xf5\xb4[U: received setenforce notice (enforcing=1143651552) Feb 12 20:24:58.628069 sudo[1207]: pam_unix(sudo:session): session closed for user root Feb 12 20:24:58.629603 sshd[1204]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:58.632808 systemd[1]: sshd@4-10.0.0.86:22-10.0.0.1:36472.service: Deactivated successfully. Feb 12 20:24:58.633496 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:24:58.634112 systemd-logind[1102]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:24:58.635471 systemd[1]: Started sshd@5-10.0.0.86:22-10.0.0.1:36482.service. Feb 12 20:24:58.636225 systemd-logind[1102]: Removed session 5. Feb 12 20:24:58.676374 sshd[1211]: Accepted publickey for core from 10.0.0.1 port 36482 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:24:58.677315 sshd[1211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:58.680579 systemd-logind[1102]: New session 6 of user core. Feb 12 20:24:58.681265 systemd[1]: Started session-6.scope. Feb 12 20:24:58.732619 sudo[1215]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:24:58.732793 sudo[1215]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:24:58.735433 sudo[1215]: pam_unix(sudo:session): session closed for user root Feb 12 20:24:58.739376 sudo[1214]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:24:58.739537 sudo[1214]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:24:58.747393 systemd[1]: Stopping audit-rules.service... Feb 12 20:24:58.747000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:24:58.748883 auditctl[1218]: No rules Feb 12 20:24:58.749050 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:24:58.749169 systemd[1]: Stopped audit-rules.service. Feb 12 20:24:58.749306 kernel: kauditd_printk_skb: 236 callbacks suppressed Feb 12 20:24:58.749339 kernel: audit: type=1305 audit(1707769498.747:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:24:58.747000 audit[1218]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6a453ca0 a2=420 a3=0 items=0 ppid=1 pid=1218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:58.750627 systemd[1]: Starting audit-rules.service... Feb 12 20:24:58.753510 kernel: audit: type=1300 audit(1707769498.747:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff6a453ca0 a2=420 a3=0 items=0 ppid=1 pid=1218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:58.753677 kernel: audit: type=1327 audit(1707769498.747:157): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:24:58.747000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:24:58.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.756435 kernel: audit: type=1131 audit(1707769498.748:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.766606 augenrules[1235]: No rules Feb 12 20:24:58.767362 systemd[1]: Finished audit-rules.service. Feb 12 20:24:58.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.768230 sudo[1214]: pam_unix(sudo:session): session closed for user root Feb 12 20:24:58.767000 audit[1214]: USER_END pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.769471 sshd[1211]: pam_unix(sshd:session): session closed for user core Feb 12 20:24:58.772859 systemd[1]: Started sshd@6-10.0.0.86:22-10.0.0.1:36496.service. Feb 12 20:24:58.773038 kernel: audit: type=1130 audit(1707769498.766:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.773068 kernel: audit: type=1106 audit(1707769498.767:160): pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.773083 kernel: audit: type=1104 audit(1707769498.767:161): pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.767000 audit[1214]: CRED_DISP pid=1214 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.773222 systemd[1]: sshd@5-10.0.0.86:22-10.0.0.1:36482.service: Deactivated successfully. Feb 12 20:24:58.773805 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:24:58.774367 systemd-logind[1102]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:24:58.775195 systemd-logind[1102]: Removed session 6. Feb 12 20:24:58.769000 audit[1211]: USER_END pid=1211 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:24:58.778781 kernel: audit: type=1106 audit(1707769498.769:162): pid=1211 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:24:58.778812 kernel: audit: type=1104 audit(1707769498.769:163): pid=1211 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:24:58.769000 audit[1211]: CRED_DISP pid=1211 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:24:58.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.86:22-10.0.0.1:36496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.783448 kernel: audit: type=1130 audit(1707769498.772:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.86:22-10.0.0.1:36496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.86:22-10.0.0.1:36482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.813000 audit[1240]: USER_ACCT pid=1240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:24:58.814704 sshd[1240]: Accepted publickey for core from 10.0.0.1 port 36496 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:24:58.814000 audit[1240]: CRED_ACQ pid=1240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:24:58.814000 audit[1240]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea72166d0 a2=3 a3=0 items=0 ppid=1 pid=1240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:24:58.814000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:24:58.815842 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:24:58.819190 systemd-logind[1102]: New session 7 of user core. Feb 12 20:24:58.819876 systemd[1]: Started session-7.scope. Feb 12 20:24:58.822000 audit[1240]: USER_START pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:24:58.823000 audit[1243]: CRED_ACQ pid=1243 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:24:58.871000 audit[1244]: USER_ACCT pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.871000 audit[1244]: CRED_REFR pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:24:58.872236 sudo[1244]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:24:58.872439 sudo[1244]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:24:58.873000 audit[1244]: USER_START pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:24:59.402755 systemd[1]: Reloading. Feb 12 20:24:59.464398 /usr/lib/systemd/system-generators/torcx-generator[1273]: time="2024-02-12T20:24:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:24:59.464436 /usr/lib/systemd/system-generators/torcx-generator[1273]: time="2024-02-12T20:24:59Z" level=info msg="torcx already run" Feb 12 20:24:59.521726 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:24:59.521744 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:24:59.540862 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.597000 audit: BPF prog-id=31 op=LOAD Feb 12 20:24:59.597000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit: BPF prog-id=32 op=LOAD Feb 12 20:24:59.599000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.600000 audit: BPF prog-id=33 op=LOAD Feb 12 20:24:59.600000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit: BPF prog-id=34 op=LOAD Feb 12 20:24:59.601000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit: BPF prog-id=35 op=LOAD Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.601000 audit: BPF prog-id=36 op=LOAD Feb 12 20:24:59.601000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:24:59.601000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit: BPF prog-id=37 op=LOAD Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit: BPF prog-id=38 op=LOAD Feb 12 20:24:59.603000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:24:59.603000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit: BPF prog-id=39 op=LOAD Feb 12 20:24:59.604000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit: BPF prog-id=40 op=LOAD Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.604000 audit: BPF prog-id=41 op=LOAD Feb 12 20:24:59.604000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:24:59.604000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.605000 audit: BPF prog-id=42 op=LOAD Feb 12 20:24:59.605000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit: BPF prog-id=43 op=LOAD Feb 12 20:24:59.606000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit: BPF prog-id=44 op=LOAD Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:24:59.606000 audit: BPF prog-id=45 op=LOAD Feb 12 20:24:59.606000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:24:59.606000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:24:59.614458 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:24:59.619269 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:24:59.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:59.619853 systemd[1]: Reached target network-online.target. Feb 12 20:24:59.621166 systemd[1]: Started kubelet.service. Feb 12 20:24:59.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:59.632137 systemd[1]: Starting coreos-metadata.service... Feb 12 20:24:59.639582 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 12 20:24:59.639837 systemd[1]: Finished coreos-metadata.service. Feb 12 20:24:59.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:59.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:59.666333 kubelet[1315]: E0212 20:24:59.666169 1315 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 20:24:59.669630 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:24:59.669776 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:24:59.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:24:59.813513 systemd[1]: Stopped kubelet.service. Feb 12 20:24:59.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:59.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:24:59.826837 systemd[1]: Reloading. Feb 12 20:24:59.885000 /usr/lib/systemd/system-generators/torcx-generator[1384]: time="2024-02-12T20:24:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:24:59.885031 /usr/lib/systemd/system-generators/torcx-generator[1384]: time="2024-02-12T20:24:59Z" level=info msg="torcx already run" Feb 12 20:24:59.941941 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:24:59.941956 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:24:59.958505 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.014000 audit: BPF prog-id=46 op=LOAD Feb 12 20:25:00.014000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit: BPF prog-id=47 op=LOAD Feb 12 20:25:00.016000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.016000 audit: BPF prog-id=48 op=LOAD Feb 12 20:25:00.016000 audit: BPF prog-id=33 op=UNLOAD Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit: BPF prog-id=49 op=LOAD Feb 12 20:25:00.018000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit: BPF prog-id=50 op=LOAD Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.018000 audit: BPF prog-id=51 op=LOAD Feb 12 20:25:00.018000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:25:00.018000 audit: BPF prog-id=36 op=UNLOAD Feb 12 20:25:00.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit: BPF prog-id=52 op=LOAD Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit: BPF prog-id=53 op=LOAD Feb 12 20:25:00.020000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:25:00.020000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit: BPF prog-id=54 op=LOAD Feb 12 20:25:00.020000 audit: BPF prog-id=39 op=UNLOAD Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.020000 audit: BPF prog-id=55 op=LOAD Feb 12 20:25:00.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit: BPF prog-id=56 op=LOAD Feb 12 20:25:00.021000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:25:00.021000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.022000 audit: BPF prog-id=57 op=LOAD Feb 12 20:25:00.022000 audit: BPF prog-id=42 op=UNLOAD Feb 12 20:25:00.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit: BPF prog-id=58 op=LOAD Feb 12 20:25:00.023000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit: BPF prog-id=59 op=LOAD Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.023000 audit: BPF prog-id=60 op=LOAD Feb 12 20:25:00.023000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:25:00.023000 audit: BPF prog-id=45 op=UNLOAD Feb 12 20:25:00.033597 systemd[1]: Started kubelet.service. Feb 12 20:25:00.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:00.076395 kubelet[1425]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:25:00.076738 kubelet[1425]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:25:00.076909 kubelet[1425]: I0212 20:25:00.076879 1425 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:25:00.078720 kubelet[1425]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:25:00.078720 kubelet[1425]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:25:00.759831 kubelet[1425]: I0212 20:25:00.759794 1425 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 20:25:00.759831 kubelet[1425]: I0212 20:25:00.759826 1425 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:25:00.760122 kubelet[1425]: I0212 20:25:00.760103 1425 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 20:25:00.762188 kubelet[1425]: I0212 20:25:00.762144 1425 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:25:00.766906 kubelet[1425]: I0212 20:25:00.766889 1425 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:25:00.767137 kubelet[1425]: I0212 20:25:00.767119 1425 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:25:00.767206 kubelet[1425]: I0212 20:25:00.767194 1425 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:25:00.767300 kubelet[1425]: I0212 20:25:00.767218 1425 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:25:00.767300 kubelet[1425]: I0212 20:25:00.767231 1425 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 20:25:00.767343 kubelet[1425]: I0212 20:25:00.767325 1425 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:25:00.772292 kubelet[1425]: I0212 20:25:00.772238 1425 kubelet.go:398] "Attempting to sync node with API server" Feb 12 20:25:00.772292 kubelet[1425]: I0212 20:25:00.772288 1425 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:25:00.772400 kubelet[1425]: I0212 20:25:00.772320 1425 kubelet.go:297] "Adding apiserver pod source" Feb 12 20:25:00.772400 kubelet[1425]: I0212 20:25:00.772346 1425 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:25:00.772699 kubelet[1425]: E0212 20:25:00.772675 1425 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:00.772748 kubelet[1425]: E0212 20:25:00.772736 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:00.773075 kubelet[1425]: I0212 20:25:00.773058 1425 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:25:00.773368 kubelet[1425]: W0212 20:25:00.773351 1425 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:25:00.773830 kubelet[1425]: I0212 20:25:00.773806 1425 server.go:1186] "Started kubelet" Feb 12 20:25:00.773870 kubelet[1425]: I0212 20:25:00.773864 1425 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:25:00.774649 kubelet[1425]: I0212 20:25:00.774621 1425 server.go:451] "Adding debug handlers to kubelet server" Feb 12 20:25:00.774917 kubelet[1425]: E0212 20:25:00.774877 1425 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:25:00.774950 kubelet[1425]: E0212 20:25:00.774924 1425 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:25:00.774000 audit[1425]: AVC avc: denied { mac_admin } for pid=1425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.774000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:25:00.774000 audit[1425]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0001bcc00 a1=c000b3e900 a2=c0001bcbd0 a3=25 items=0 ppid=1 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.774000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:25:00.774000 audit[1425]: AVC avc: denied { mac_admin } for pid=1425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.774000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:25:00.774000 audit[1425]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00047c5c0 a1=c000b3e918 a2=c0001bcc90 a3=25 items=0 ppid=1 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.774000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:25:00.775263 kubelet[1425]: I0212 20:25:00.775106 1425 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:25:00.775263 kubelet[1425]: I0212 20:25:00.775151 1425 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:25:00.775263 kubelet[1425]: I0212 20:25:00.775197 1425 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:25:00.775760 kubelet[1425]: I0212 20:25:00.775723 1425 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 20:25:00.776021 kubelet[1425]: I0212 20:25:00.775866 1425 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 20:25:00.799523 kubelet[1425]: W0212 20:25:00.799468 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.86" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:00.799523 kubelet[1425]: E0212 20:25:00.799502 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.86" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:00.799523 kubelet[1425]: E0212 20:25:00.799525 1425 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.0.0.86" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:00.799843 kubelet[1425]: W0212 20:25:00.799618 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:00.799843 kubelet[1425]: E0212 20:25:00.799627 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:00.799843 kubelet[1425]: W0212 20:25:00.799644 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:00.799843 kubelet[1425]: E0212 20:25:00.799650 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:00.799966 kubelet[1425]: E0212 20:25:00.799669 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b3375013de16eb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 773783275, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 773783275, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.800661 kubelet[1425]: E0212 20:25:00.800530 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b3375013ef4f76", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 774911862, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 774911862, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.803540 kubelet[1425]: E0212 20:25:00.803370 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d1952", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.86 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799932754, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799932754, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.803913 kubelet[1425]: I0212 20:25:00.803884 1425 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:25:00.803913 kubelet[1425]: I0212 20:25:00.803904 1425 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:25:00.803913 kubelet[1425]: I0212 20:25:00.803917 1425 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:25:00.803000 audit[1438]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.803000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcaa9e6f20 a2=0 a3=7ffcaa9e6f0c items=0 ppid=1425 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:25:00.805227 kubelet[1425]: E0212 20:25:00.804642 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d27d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.86 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799936471, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799936471, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.805883 kubelet[1425]: E0212 20:25:00.805829 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d2f97", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.86 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799938455, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799938455, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.805000 audit[1443]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.805000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe4813b650 a2=0 a3=7ffe4813b63c items=0 ppid=1425 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:25:00.806850 kubelet[1425]: I0212 20:25:00.806825 1425 policy_none.go:49] "None policy: Start" Feb 12 20:25:00.807477 kubelet[1425]: I0212 20:25:00.807439 1425 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:25:00.807477 kubelet[1425]: I0212 20:25:00.807467 1425 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:25:00.814071 systemd[1]: Created slice kubepods.slice. Feb 12 20:25:00.817511 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:25:00.807000 audit[1445]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.807000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff5aa65720 a2=0 a3=7fff5aa6570c items=0 ppid=1425 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:25:00.820000 audit[1450]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.820000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1c6f1170 a2=0 a3=7ffe1c6f115c items=0 ppid=1425 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:25:00.826903 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:25:00.827894 kubelet[1425]: I0212 20:25:00.827872 1425 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:25:00.827000 audit[1425]: AVC avc: denied { mac_admin } for pid=1425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:00.827000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:25:00.827000 audit[1425]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d37d70 a1=c000d13d70 a2=c000d37d40 a3=25 items=0 ppid=1 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.827000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:25:00.828096 kubelet[1425]: I0212 20:25:00.827969 1425 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:25:00.828287 kubelet[1425]: I0212 20:25:00.828263 1425 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:25:00.828903 kubelet[1425]: E0212 20:25:00.828887 1425 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.86\" not found" Feb 12 20:25:00.838353 kubelet[1425]: E0212 20:25:00.838250 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b3375017a61f46", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 837224262, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 837224262, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.856000 audit[1457]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.856000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd2dec8410 a2=0 a3=7ffd2dec83fc items=0 ppid=1425 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:25:00.857000 audit[1458]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.857000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc4d0187c0 a2=0 a3=7ffc4d0187ac items=0 ppid=1425 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 20:25:00.862000 audit[1461]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.862000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc8adccce0 a2=0 a3=7ffc8adccccc items=0 ppid=1425 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 20:25:00.865000 audit[1464]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.865000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffe3dcd4570 a2=0 a3=7ffe3dcd455c items=0 ppid=1425 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 20:25:00.866000 audit[1465]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.866000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc633af040 a2=0 a3=7ffc633af02c items=0 ppid=1425 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 20:25:00.867000 audit[1466]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.867000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd87056f0 a2=0 a3=7ffcd87056dc items=0 ppid=1425 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:25:00.868000 audit[1468]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.868000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe0524b1c0 a2=0 a3=7ffe0524b1ac items=0 ppid=1425 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 20:25:00.877008 kubelet[1425]: I0212 20:25:00.876972 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.86" Feb 12 20:25:00.877904 kubelet[1425]: E0212 20:25:00.877851 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.86" Feb 12 20:25:00.878082 kubelet[1425]: E0212 20:25:00.878019 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d1952", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.86 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799932754, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 876920962, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d1952" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.878662 kubelet[1425]: E0212 20:25:00.878608 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d27d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.86 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799936471, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 876931963, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d27d7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.879267 kubelet[1425]: E0212 20:25:00.879198 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d2f97", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.86 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799938455, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 876935289, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d2f97" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:00.870000 audit[1470]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.870000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffec73e5500 a2=0 a3=7ffec73e54ec items=0 ppid=1425 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.870000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:25:00.888000 audit[1473]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.888000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fffaa1b5a00 a2=0 a3=7fffaa1b59ec items=0 ppid=1425 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 20:25:00.890000 audit[1475]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.890000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff3cbb7510 a2=0 a3=7fff3cbb74fc items=0 ppid=1425 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 20:25:00.898000 audit[1478]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.898000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffc9c50f450 a2=0 a3=7ffc9c50f43c items=0 ppid=1425 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 20:25:00.899163 kubelet[1425]: I0212 20:25:00.899050 1425 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:25:00.899000 audit[1480]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.899000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd20664cf0 a2=0 a3=7ffd20664cdc items=0 ppid=1425 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:25:00.899000 audit[1479]: NETFILTER_CFG table=mangle:18 family=10 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.899000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe1183b0e0 a2=0 a3=10e3 items=0 ppid=1425 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:25:00.900000 audit[1481]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.900000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd430828c0 a2=0 a3=7ffd430828ac items=0 ppid=1425 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:25:00.900000 audit[1482]: NETFILTER_CFG table=nat:20 family=10 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.900000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffcb9a39a0 a2=0 a3=7fffcb9a398c items=0 ppid=1425 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 20:25:00.901000 audit[1483]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:00.901000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce1e806f0 a2=0 a3=7ffce1e806dc items=0 ppid=1425 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:25:00.902000 audit[1485]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.902000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc71ceafe0 a2=0 a3=7ffc71ceafcc items=0 ppid=1425 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 20:25:00.903000 audit[1486]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.903000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe1f42fa40 a2=0 a3=7ffe1f42fa2c items=0 ppid=1425 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:25:00.905000 audit[1488]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.905000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd31103ad0 a2=0 a3=7ffd31103abc items=0 ppid=1425 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 20:25:00.905000 audit[1489]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.905000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa035a3a0 a2=0 a3=7fffa035a38c items=0 ppid=1425 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 20:25:00.906000 audit[1490]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.906000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc674d3060 a2=0 a3=7ffc674d304c items=0 ppid=1425 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.906000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:25:00.908000 audit[1492]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.908000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff78e87140 a2=0 a3=7fff78e8712c items=0 ppid=1425 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 20:25:00.912000 audit[1494]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.912000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe74501fb0 a2=0 a3=7ffe74501f9c items=0 ppid=1425 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:25:00.914000 audit[1496]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.914000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc56c238e0 a2=0 a3=7ffc56c238cc items=0 ppid=1425 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 20:25:00.916000 audit[1498]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.916000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffcf7d81560 a2=0 a3=7ffcf7d8154c items=0 ppid=1425 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.916000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 20:25:00.919000 audit[1500]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.919000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffeaea7c310 a2=0 a3=7ffeaea7c2fc items=0 ppid=1425 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 20:25:00.920195 kubelet[1425]: I0212 20:25:00.920161 1425 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:25:00.920195 kubelet[1425]: I0212 20:25:00.920193 1425 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 20:25:00.920290 kubelet[1425]: I0212 20:25:00.920218 1425 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 20:25:00.920325 kubelet[1425]: E0212 20:25:00.920292 1425 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 20:25:00.920000 audit[1501]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.920000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd72c9f8f0 a2=0 a3=7ffd72c9f8dc items=0 ppid=1425 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:25:00.922088 kubelet[1425]: W0212 20:25:00.922065 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:00.922143 kubelet[1425]: E0212 20:25:00.922099 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:00.921000 audit[1502]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.921000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcefc63b60 a2=0 a3=7ffcefc63b4c items=0 ppid=1425 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:25:00.922000 audit[1503]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:00.922000 audit[1503]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc4f41410 a2=0 a3=7fffc4f413fc items=0 ppid=1425 pid=1503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:00.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:25:01.001495 kubelet[1425]: E0212 20:25:01.001448 1425 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.0.0.86" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:01.078705 kubelet[1425]: I0212 20:25:01.078602 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.86" Feb 12 20:25:01.080091 kubelet[1425]: E0212 20:25:01.080050 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.86" Feb 12 20:25:01.080281 kubelet[1425]: E0212 20:25:01.080066 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d1952", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.86 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799932754, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 1, 78564989, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d1952" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:01.081084 kubelet[1425]: E0212 20:25:01.080910 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d27d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.86 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799936471, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 1, 78572242, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d27d7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:01.176454 kubelet[1425]: E0212 20:25:01.176361 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d2f97", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.86 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799938455, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 1, 78574867, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d2f97" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:01.403045 kubelet[1425]: E0212 20:25:01.402904 1425 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.0.0.86" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:01.480983 kubelet[1425]: I0212 20:25:01.480935 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.86" Feb 12 20:25:01.481924 kubelet[1425]: E0212 20:25:01.481907 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.86" Feb 12 20:25:01.482038 kubelet[1425]: E0212 20:25:01.481956 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d1952", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.86 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799932754, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 1, 480882501, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d1952" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:01.576348 kubelet[1425]: E0212 20:25:01.576245 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d27d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.86 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799936471, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 1, 480900976, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d27d7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:01.701215 kubelet[1425]: W0212 20:25:01.701098 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:01.701215 kubelet[1425]: E0212 20:25:01.701136 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:01.773474 kubelet[1425]: E0212 20:25:01.773394 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:01.775856 kubelet[1425]: E0212 20:25:01.775745 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d2f97", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.86 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799938455, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 1, 480904553, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d2f97" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:02.032266 kubelet[1425]: W0212 20:25:02.032139 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.86" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:02.032266 kubelet[1425]: E0212 20:25:02.032172 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.86" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:02.206314 kubelet[1425]: E0212 20:25:02.206257 1425 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.0.0.86" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:02.283535 kubelet[1425]: I0212 20:25:02.283417 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.86" Feb 12 20:25:02.284584 kubelet[1425]: E0212 20:25:02.284557 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.86" Feb 12 20:25:02.284674 kubelet[1425]: E0212 20:25:02.284606 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d1952", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.86 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799932754, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 2, 283375669, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d1952" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:02.285324 kubelet[1425]: E0212 20:25:02.285271 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d27d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.86 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799936471, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 2, 283384726, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d27d7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:02.375624 kubelet[1425]: E0212 20:25:02.375525 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d2f97", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.86 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799938455, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 2, 283388994, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d2f97" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:02.391733 kubelet[1425]: W0212 20:25:02.391697 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:02.391733 kubelet[1425]: E0212 20:25:02.391728 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:02.499297 kubelet[1425]: W0212 20:25:02.499265 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:02.499297 kubelet[1425]: E0212 20:25:02.499301 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:02.774114 kubelet[1425]: E0212 20:25:02.773698 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:03.774853 kubelet[1425]: E0212 20:25:03.774797 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:03.808232 kubelet[1425]: E0212 20:25:03.808208 1425 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.0.0.86" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:03.885339 kubelet[1425]: I0212 20:25:03.885307 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.86" Feb 12 20:25:03.886310 kubelet[1425]: E0212 20:25:03.886288 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.86" Feb 12 20:25:03.886383 kubelet[1425]: E0212 20:25:03.886279 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d1952", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.86 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799932754, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 3, 885273792, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d1952" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:03.887203 kubelet[1425]: E0212 20:25:03.887156 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d27d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.86 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799936471, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 3, 885278781, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d27d7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:03.887858 kubelet[1425]: E0212 20:25:03.887810 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d2f97", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.86 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799938455, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 3, 885281687, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d2f97" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:04.315907 kubelet[1425]: W0212 20:25:04.315872 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:04.315907 kubelet[1425]: E0212 20:25:04.315909 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:04.537067 kubelet[1425]: W0212 20:25:04.537033 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.86" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:04.537067 kubelet[1425]: E0212 20:25:04.537074 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.86" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:04.775144 kubelet[1425]: E0212 20:25:04.775008 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:04.822337 kubelet[1425]: W0212 20:25:04.822297 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:04.822337 kubelet[1425]: E0212 20:25:04.822326 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:04.960155 kubelet[1425]: W0212 20:25:04.960117 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:04.960155 kubelet[1425]: E0212 20:25:04.960152 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:05.775806 kubelet[1425]: E0212 20:25:05.775729 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:06.776596 kubelet[1425]: E0212 20:25:06.776543 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:07.009629 kubelet[1425]: E0212 20:25:07.009593 1425 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.0.0.86" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:07.087369 kubelet[1425]: I0212 20:25:07.087266 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.86" Feb 12 20:25:07.088031 kubelet[1425]: E0212 20:25:07.088009 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.86" Feb 12 20:25:07.088031 kubelet[1425]: E0212 20:25:07.087979 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d1952", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.86 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799932754, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 7, 87234756, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d1952" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:07.088619 kubelet[1425]: E0212 20:25:07.088572 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d27d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.86 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799936471, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 7, 87242600, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d27d7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:07.089181 kubelet[1425]: E0212 20:25:07.089118 1425 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86.17b33750156d2f97", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.86", UID:"10.0.0.86", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.86 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.86"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 0, 799938455, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 7, 87245686, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.86.17b33750156d2f97" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:07.777318 kubelet[1425]: E0212 20:25:07.777251 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:08.759415 kubelet[1425]: W0212 20:25:08.759367 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.86" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:08.759415 kubelet[1425]: E0212 20:25:08.759404 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.86" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:08.763611 kubelet[1425]: W0212 20:25:08.763545 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:08.763611 kubelet[1425]: E0212 20:25:08.763569 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:08.777854 kubelet[1425]: E0212 20:25:08.777806 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:09.778572 kubelet[1425]: E0212 20:25:09.778522 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:10.225573 kubelet[1425]: W0212 20:25:10.225456 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:10.225573 kubelet[1425]: E0212 20:25:10.225488 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:10.407714 kubelet[1425]: W0212 20:25:10.407657 1425 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:10.407714 kubelet[1425]: E0212 20:25:10.407690 1425 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:10.762219 kubelet[1425]: I0212 20:25:10.762165 1425 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 20:25:10.779531 kubelet[1425]: E0212 20:25:10.779505 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:10.830035 kubelet[1425]: E0212 20:25:10.829981 1425 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.86\" not found" Feb 12 20:25:11.139456 kubelet[1425]: E0212 20:25:11.139344 1425 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.86" not found Feb 12 20:25:11.780671 kubelet[1425]: E0212 20:25:11.780620 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:12.202218 kubelet[1425]: E0212 20:25:12.202089 1425 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.86" not found Feb 12 20:25:12.781532 kubelet[1425]: E0212 20:25:12.781483 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:13.413443 kubelet[1425]: E0212 20:25:13.413389 1425 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.86\" not found" node="10.0.0.86" Feb 12 20:25:13.489457 kubelet[1425]: I0212 20:25:13.489425 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.86" Feb 12 20:25:13.603834 kubelet[1425]: I0212 20:25:13.603795 1425 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.86" Feb 12 20:25:13.613093 kubelet[1425]: E0212 20:25:13.613065 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:13.713871 kubelet[1425]: E0212 20:25:13.713745 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:13.782431 kubelet[1425]: E0212 20:25:13.782387 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:13.814545 kubelet[1425]: E0212 20:25:13.814518 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:13.915178 kubelet[1425]: E0212 20:25:13.915110 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.015733 kubelet[1425]: E0212 20:25:14.015695 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.044305 sudo[1244]: pam_unix(sudo:session): session closed for user root Feb 12 20:25:14.043000 audit[1244]: USER_END pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:14.045290 kernel: kauditd_printk_skb: 474 callbacks suppressed Feb 12 20:25:14.045352 kernel: audit: type=1106 audit(1707769514.043:562): pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:14.045369 sshd[1240]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:14.047244 systemd[1]: sshd@6-10.0.0.86:22-10.0.0.1:36496.service: Deactivated successfully. Feb 12 20:25:14.043000 audit[1244]: CRED_DISP pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:14.047922 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:25:14.048576 systemd-logind[1102]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:25:14.049227 systemd-logind[1102]: Removed session 7. Feb 12 20:25:14.050078 kernel: audit: type=1104 audit(1707769514.043:563): pid=1244 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:14.050126 kernel: audit: type=1106 audit(1707769514.045:564): pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:25:14.045000 audit[1240]: USER_END pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:25:14.045000 audit[1240]: CRED_DISP pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:25:14.055543 kernel: audit: type=1104 audit(1707769514.045:565): pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:25:14.055581 kernel: audit: type=1131 audit(1707769514.046:566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.86:22-10.0.0.1:36496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:14.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.86:22-10.0.0.1:36496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:14.115853 kubelet[1425]: E0212 20:25:14.115819 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.216628 kubelet[1425]: E0212 20:25:14.216591 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.317382 kubelet[1425]: E0212 20:25:14.317241 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.417815 kubelet[1425]: E0212 20:25:14.417751 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.518412 kubelet[1425]: E0212 20:25:14.518350 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.618972 kubelet[1425]: E0212 20:25:14.618850 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.719522 kubelet[1425]: E0212 20:25:14.719456 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.784176 kubelet[1425]: E0212 20:25:14.783464 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:14.820680 kubelet[1425]: E0212 20:25:14.820596 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:14.921470 kubelet[1425]: E0212 20:25:14.921349 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.022106 kubelet[1425]: E0212 20:25:15.022047 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.122855 kubelet[1425]: E0212 20:25:15.122796 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.223540 kubelet[1425]: E0212 20:25:15.223413 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.324094 kubelet[1425]: E0212 20:25:15.324041 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.424973 kubelet[1425]: E0212 20:25:15.424918 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.525682 kubelet[1425]: E0212 20:25:15.525623 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.626341 kubelet[1425]: E0212 20:25:15.626285 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.726858 kubelet[1425]: E0212 20:25:15.726815 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.784527 kubelet[1425]: E0212 20:25:15.784439 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:15.827614 kubelet[1425]: E0212 20:25:15.827580 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:15.928031 kubelet[1425]: E0212 20:25:15.927981 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.028443 kubelet[1425]: E0212 20:25:16.028380 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.128998 kubelet[1425]: E0212 20:25:16.128895 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.229378 kubelet[1425]: E0212 20:25:16.229348 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.329966 kubelet[1425]: E0212 20:25:16.329937 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.430534 kubelet[1425]: E0212 20:25:16.430432 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.531058 kubelet[1425]: E0212 20:25:16.530996 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.631586 kubelet[1425]: E0212 20:25:16.631539 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.732048 kubelet[1425]: E0212 20:25:16.731959 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.785577 kubelet[1425]: E0212 20:25:16.785547 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:16.832827 kubelet[1425]: E0212 20:25:16.832775 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:16.933683 kubelet[1425]: E0212 20:25:16.933638 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.033955 kubelet[1425]: E0212 20:25:17.033901 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.134573 kubelet[1425]: E0212 20:25:17.134516 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.235198 kubelet[1425]: E0212 20:25:17.235135 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.336064 kubelet[1425]: E0212 20:25:17.335921 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.436714 kubelet[1425]: E0212 20:25:17.436647 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.537375 kubelet[1425]: E0212 20:25:17.537317 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.638102 kubelet[1425]: E0212 20:25:17.637973 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.738959 kubelet[1425]: E0212 20:25:17.738892 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.786646 kubelet[1425]: E0212 20:25:17.786593 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:17.840080 kubelet[1425]: E0212 20:25:17.840010 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:17.941122 kubelet[1425]: E0212 20:25:17.940951 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.041749 kubelet[1425]: E0212 20:25:18.041693 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.142362 kubelet[1425]: E0212 20:25:18.142316 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.242869 kubelet[1425]: E0212 20:25:18.242830 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.343431 kubelet[1425]: E0212 20:25:18.343384 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.444003 kubelet[1425]: E0212 20:25:18.443936 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.544702 kubelet[1425]: E0212 20:25:18.544558 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.645331 kubelet[1425]: E0212 20:25:18.645257 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.745895 kubelet[1425]: E0212 20:25:18.745827 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.787670 kubelet[1425]: E0212 20:25:18.787634 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:18.846020 kubelet[1425]: E0212 20:25:18.845898 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:18.946246 kubelet[1425]: E0212 20:25:18.946209 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.046705 kubelet[1425]: E0212 20:25:19.046646 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.147188 kubelet[1425]: E0212 20:25:19.147070 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.247515 kubelet[1425]: E0212 20:25:19.247466 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.348082 kubelet[1425]: E0212 20:25:19.348022 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.448566 kubelet[1425]: E0212 20:25:19.448444 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.548920 kubelet[1425]: E0212 20:25:19.548875 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.649245 kubelet[1425]: E0212 20:25:19.649203 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.750171 kubelet[1425]: E0212 20:25:19.750134 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.787916 kubelet[1425]: E0212 20:25:19.787866 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:19.850377 kubelet[1425]: E0212 20:25:19.850317 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:19.950787 kubelet[1425]: E0212 20:25:19.950750 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:20.051384 kubelet[1425]: E0212 20:25:20.051259 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:20.152092 kubelet[1425]: E0212 20:25:20.152031 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:20.252621 kubelet[1425]: E0212 20:25:20.252561 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:20.353419 kubelet[1425]: E0212 20:25:20.353302 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:20.453841 kubelet[1425]: E0212 20:25:20.453794 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:20.554351 kubelet[1425]: E0212 20:25:20.554291 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.86\" not found" Feb 12 20:25:20.654979 kubelet[1425]: I0212 20:25:20.654869 1425 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 20:25:20.655372 env[1113]: time="2024-02-12T20:25:20.655290209Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:25:20.655651 kubelet[1425]: I0212 20:25:20.655474 1425 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 20:25:20.773429 kubelet[1425]: E0212 20:25:20.773397 1425 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:20.784808 kubelet[1425]: I0212 20:25:20.784786 1425 apiserver.go:52] "Watching apiserver" Feb 12 20:25:20.786872 kubelet[1425]: I0212 20:25:20.786849 1425 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:25:20.786976 kubelet[1425]: I0212 20:25:20.786946 1425 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:25:20.787030 kubelet[1425]: I0212 20:25:20.787004 1425 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:25:20.787156 kubelet[1425]: E0212 20:25:20.787134 1425 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:20.788071 kubelet[1425]: E0212 20:25:20.788051 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:20.791494 systemd[1]: Created slice kubepods-besteffort-pod9957c0ce_38fb_4aaa_a59e_7951dee429d9.slice. Feb 12 20:25:20.801176 systemd[1]: Created slice kubepods-besteffort-pod8bdfa0c7_31d2_4dae_bbff_ddb221acb0db.slice. Feb 12 20:25:20.877286 kubelet[1425]: I0212 20:25:20.877255 1425 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 20:25:20.885890 kubelet[1425]: I0212 20:25:20.885865 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-var-lib-calico\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.885890 kubelet[1425]: I0212 20:25:20.885893 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5mgxd\" (UniqueName: \"kubernetes.io/projected/9957c0ce-38fb-4aaa-a59e-7951dee429d9-kube-api-access-5mgxd\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886016 kubelet[1425]: I0212 20:25:20.885913 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1740b60c-9243-442f-a724-6898e57f5ddc-kubelet-dir\") pod \"csi-node-driver-dh84x\" (UID: \"1740b60c-9243-442f-a724-6898e57f5ddc\") " pod="calico-system/csi-node-driver-dh84x" Feb 12 20:25:20.886016 kubelet[1425]: I0212 20:25:20.885930 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-lib-modules\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886016 kubelet[1425]: I0212 20:25:20.885946 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9957c0ce-38fb-4aaa-a59e-7951dee429d9-node-certs\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886016 kubelet[1425]: I0212 20:25:20.885972 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-var-run-calico\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886016 kubelet[1425]: I0212 20:25:20.886007 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-cni-net-dir\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886183 kubelet[1425]: I0212 20:25:20.886044 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-flexvol-driver-host\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886183 kubelet[1425]: I0212 20:25:20.886083 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8bdfa0c7-31d2-4dae-bbff-ddb221acb0db-lib-modules\") pod \"kube-proxy-nsbnj\" (UID: \"8bdfa0c7-31d2-4dae-bbff-ddb221acb0db\") " pod="kube-system/kube-proxy-nsbnj" Feb 12 20:25:20.886183 kubelet[1425]: I0212 20:25:20.886115 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1740b60c-9243-442f-a724-6898e57f5ddc-socket-dir\") pod \"csi-node-driver-dh84x\" (UID: \"1740b60c-9243-442f-a724-6898e57f5ddc\") " pod="calico-system/csi-node-driver-dh84x" Feb 12 20:25:20.886183 kubelet[1425]: I0212 20:25:20.886142 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-cni-log-dir\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886183 kubelet[1425]: I0212 20:25:20.886181 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8bdfa0c7-31d2-4dae-bbff-ddb221acb0db-xtables-lock\") pod \"kube-proxy-nsbnj\" (UID: \"8bdfa0c7-31d2-4dae-bbff-ddb221acb0db\") " pod="kube-system/kube-proxy-nsbnj" Feb 12 20:25:20.886348 kubelet[1425]: I0212 20:25:20.886209 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4kd8m\" (UniqueName: \"kubernetes.io/projected/8bdfa0c7-31d2-4dae-bbff-ddb221acb0db-kube-api-access-4kd8m\") pod \"kube-proxy-nsbnj\" (UID: \"8bdfa0c7-31d2-4dae-bbff-ddb221acb0db\") " pod="kube-system/kube-proxy-nsbnj" Feb 12 20:25:20.886348 kubelet[1425]: I0212 20:25:20.886234 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1740b60c-9243-442f-a724-6898e57f5ddc-varrun\") pod \"csi-node-driver-dh84x\" (UID: \"1740b60c-9243-442f-a724-6898e57f5ddc\") " pod="calico-system/csi-node-driver-dh84x" Feb 12 20:25:20.886348 kubelet[1425]: I0212 20:25:20.886259 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgmgv\" (UniqueName: \"kubernetes.io/projected/1740b60c-9243-442f-a724-6898e57f5ddc-kube-api-access-rgmgv\") pod \"csi-node-driver-dh84x\" (UID: \"1740b60c-9243-442f-a724-6898e57f5ddc\") " pod="calico-system/csi-node-driver-dh84x" Feb 12 20:25:20.886348 kubelet[1425]: I0212 20:25:20.886282 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-xtables-lock\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886348 kubelet[1425]: I0212 20:25:20.886328 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-policysync\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886515 kubelet[1425]: I0212 20:25:20.886363 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9957c0ce-38fb-4aaa-a59e-7951dee429d9-tigera-ca-bundle\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886515 kubelet[1425]: I0212 20:25:20.886379 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9957c0ce-38fb-4aaa-a59e-7951dee429d9-cni-bin-dir\") pod \"calico-node-2s2mt\" (UID: \"9957c0ce-38fb-4aaa-a59e-7951dee429d9\") " pod="calico-system/calico-node-2s2mt" Feb 12 20:25:20.886515 kubelet[1425]: I0212 20:25:20.886418 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8bdfa0c7-31d2-4dae-bbff-ddb221acb0db-kube-proxy\") pod \"kube-proxy-nsbnj\" (UID: \"8bdfa0c7-31d2-4dae-bbff-ddb221acb0db\") " pod="kube-system/kube-proxy-nsbnj" Feb 12 20:25:20.886515 kubelet[1425]: I0212 20:25:20.886460 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1740b60c-9243-442f-a724-6898e57f5ddc-registration-dir\") pod \"csi-node-driver-dh84x\" (UID: \"1740b60c-9243-442f-a724-6898e57f5ddc\") " pod="calico-system/csi-node-driver-dh84x" Feb 12 20:25:20.886515 kubelet[1425]: I0212 20:25:20.886487 1425 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:25:20.988170 kubelet[1425]: E0212 20:25:20.988146 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:20.988170 kubelet[1425]: W0212 20:25:20.988165 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:20.988339 kubelet[1425]: E0212 20:25:20.988213 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:20.988559 kubelet[1425]: E0212 20:25:20.988546 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:20.988622 kubelet[1425]: W0212 20:25:20.988559 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:20.988622 kubelet[1425]: E0212 20:25:20.988578 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:20.990145 kubelet[1425]: E0212 20:25:20.990130 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:20.990145 kubelet[1425]: W0212 20:25:20.990143 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:20.990234 kubelet[1425]: E0212 20:25:20.990157 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.088426 kubelet[1425]: E0212 20:25:21.088399 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.088426 kubelet[1425]: W0212 20:25:21.088419 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.088621 kubelet[1425]: E0212 20:25:21.088442 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.088662 kubelet[1425]: E0212 20:25:21.088623 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.088662 kubelet[1425]: W0212 20:25:21.088631 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.088662 kubelet[1425]: E0212 20:25:21.088643 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.088833 kubelet[1425]: E0212 20:25:21.088818 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.088833 kubelet[1425]: W0212 20:25:21.088828 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.088925 kubelet[1425]: E0212 20:25:21.088846 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.189487 kubelet[1425]: E0212 20:25:21.189458 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.189487 kubelet[1425]: W0212 20:25:21.189476 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.189677 kubelet[1425]: E0212 20:25:21.189499 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.189677 kubelet[1425]: E0212 20:25:21.189662 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.189677 kubelet[1425]: W0212 20:25:21.189671 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.189809 kubelet[1425]: E0212 20:25:21.189684 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.189866 kubelet[1425]: E0212 20:25:21.189853 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.189866 kubelet[1425]: W0212 20:25:21.189864 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.189933 kubelet[1425]: E0212 20:25:21.189876 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.211379 kubelet[1425]: E0212 20:25:21.211355 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.211379 kubelet[1425]: W0212 20:25:21.211374 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.211505 kubelet[1425]: E0212 20:25:21.211393 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.290806 kubelet[1425]: E0212 20:25:21.290714 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.290806 kubelet[1425]: W0212 20:25:21.290727 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.290806 kubelet[1425]: E0212 20:25:21.290741 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.290981 kubelet[1425]: E0212 20:25:21.290887 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.290981 kubelet[1425]: W0212 20:25:21.290896 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.290981 kubelet[1425]: E0212 20:25:21.290909 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.392100 kubelet[1425]: E0212 20:25:21.392084 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.392100 kubelet[1425]: W0212 20:25:21.392095 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.392214 kubelet[1425]: E0212 20:25:21.392107 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.392238 kubelet[1425]: E0212 20:25:21.392229 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.392238 kubelet[1425]: W0212 20:25:21.392235 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.392283 kubelet[1425]: E0212 20:25:21.392243 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.400377 kubelet[1425]: E0212 20:25:21.400359 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:21.400909 env[1113]: time="2024-02-12T20:25:21.400871717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2s2mt,Uid:9957c0ce-38fb-4aaa-a59e-7951dee429d9,Namespace:calico-system,Attempt:0,}" Feb 12 20:25:21.410372 kubelet[1425]: E0212 20:25:21.410351 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.410372 kubelet[1425]: W0212 20:25:21.410368 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.410482 kubelet[1425]: E0212 20:25:21.410386 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.492782 kubelet[1425]: E0212 20:25:21.492749 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.492782 kubelet[1425]: W0212 20:25:21.492778 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.492905 kubelet[1425]: E0212 20:25:21.492793 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.593806 kubelet[1425]: E0212 20:25:21.593736 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.593806 kubelet[1425]: W0212 20:25:21.593750 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.593806 kubelet[1425]: E0212 20:25:21.593780 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.611746 kubelet[1425]: E0212 20:25:21.611732 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:25:21.611867 kubelet[1425]: W0212 20:25:21.611850 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:25:21.611967 kubelet[1425]: E0212 20:25:21.611951 1425 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:25:21.702811 kubelet[1425]: E0212 20:25:21.702789 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:21.703966 env[1113]: time="2024-02-12T20:25:21.703922123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nsbnj,Uid:8bdfa0c7-31d2-4dae-bbff-ddb221acb0db,Namespace:kube-system,Attempt:0,}" Feb 12 20:25:21.789136 kubelet[1425]: E0212 20:25:21.789111 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:22.064228 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4066207670.mount: Deactivated successfully. Feb 12 20:25:22.071828 env[1113]: time="2024-02-12T20:25:22.071775341Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:22.072600 env[1113]: time="2024-02-12T20:25:22.072578006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:22.075028 env[1113]: time="2024-02-12T20:25:22.075005700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:22.076153 env[1113]: time="2024-02-12T20:25:22.076131592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:22.077458 env[1113]: time="2024-02-12T20:25:22.077437551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:22.078593 env[1113]: time="2024-02-12T20:25:22.078568443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:22.079750 env[1113]: time="2024-02-12T20:25:22.079728789Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:22.081050 env[1113]: time="2024-02-12T20:25:22.081029589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:22.099561 env[1113]: time="2024-02-12T20:25:22.099489605Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:25:22.099709 env[1113]: time="2024-02-12T20:25:22.099529900Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:25:22.099709 env[1113]: time="2024-02-12T20:25:22.099542123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:25:22.099709 env[1113]: time="2024-02-12T20:25:22.099661908Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5 pid=1537 runtime=io.containerd.runc.v2 Feb 12 20:25:22.106025 env[1113]: time="2024-02-12T20:25:22.105838343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:25:22.106025 env[1113]: time="2024-02-12T20:25:22.105881274Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:25:22.106025 env[1113]: time="2024-02-12T20:25:22.105893326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:25:22.106182 env[1113]: time="2024-02-12T20:25:22.106049399Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/141e4d571f9f5866a63965a6a72836d323e41c38bfb7c6b5e50ccc97565d707a pid=1552 runtime=io.containerd.runc.v2 Feb 12 20:25:22.111944 systemd[1]: Started cri-containerd-9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5.scope. Feb 12 20:25:22.118202 systemd[1]: Started cri-containerd-141e4d571f9f5866a63965a6a72836d323e41c38bfb7c6b5e50ccc97565d707a.scope. Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.126079 kernel: audit: type=1400 audit(1707769522.121:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.126142 kernel: audit: type=1400 audit(1707769522.121:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.126169 kernel: audit: type=1400 audit(1707769522.121:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132886 kernel: audit: type=1400 audit(1707769522.121:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132960 kernel: audit: type=1400 audit(1707769522.121:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137842 kernel: audit: type=1400 audit(1707769522.121:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137882 kernel: audit: type=1400 audit(1707769522.121:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.140468 kernel: audit: type=1400 audit(1707769522.121:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.140509 kernel: audit: type=1400 audit(1707769522.121:575): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.142907 kernel: audit: type=1400 audit(1707769522.123:576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit: BPF prog-id=61 op=LOAD Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1537 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962623034666463663663646136306436326630633731323562643566 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1537 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962623034666463663663646136306436326630633731323562643566 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.125000 audit: BPF prog-id=62 op=LOAD Feb 12 20:25:22.125000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030c530 items=0 ppid=1537 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962623034666463663663646136306436326630633731323562643566 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.130000 audit: BPF prog-id=63 op=LOAD Feb 12 20:25:22.130000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030c578 items=0 ppid=1537 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962623034666463663663646136306436326630633731323562643566 Feb 12 20:25:22.132000 audit: BPF prog-id=63 op=UNLOAD Feb 12 20:25:22.132000 audit: BPF prog-id=62 op=UNLOAD Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { perfmon } for pid=1563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.140000 audit: BPF prog-id=64 op=LOAD Feb 12 20:25:22.132000 audit[1563]: AVC avc: denied { bpf } for pid=1563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.132000 audit: BPF prog-id=65 op=LOAD Feb 12 20:25:22.132000 audit[1563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030c988 items=0 ppid=1537 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962623034666463663663646136306436326630633731323562643566 Feb 12 20:25:22.140000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.140000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1552 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316534643537316639663538363661363339363561366137323833 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1552 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316534643537316639663538363661363339363561366137323833 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit: BPF prog-id=66 op=LOAD Feb 12 20:25:22.145000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002977d0 items=0 ppid=1552 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316534643537316639663538363661363339363561366137323833 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.145000 audit: BPF prog-id=67 op=LOAD Feb 12 20:25:22.145000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000297818 items=0 ppid=1552 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316534643537316639663538363661363339363561366137323833 Feb 12 20:25:22.145000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:25:22.145000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:22.146000 audit: BPF prog-id=68 op=LOAD Feb 12 20:25:22.146000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000297c28 items=0 ppid=1552 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:22.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134316534643537316639663538363661363339363561366137323833 Feb 12 20:25:22.153628 env[1113]: time="2024-02-12T20:25:22.153088200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2s2mt,Uid:9957c0ce-38fb-4aaa-a59e-7951dee429d9,Namespace:calico-system,Attempt:0,} returns sandbox id \"9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5\"" Feb 12 20:25:22.153920 kubelet[1425]: E0212 20:25:22.153902 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:22.155073 env[1113]: time="2024-02-12T20:25:22.155041955Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:25:22.157248 env[1113]: time="2024-02-12T20:25:22.157217416Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nsbnj,Uid:8bdfa0c7-31d2-4dae-bbff-ddb221acb0db,Namespace:kube-system,Attempt:0,} returns sandbox id \"141e4d571f9f5866a63965a6a72836d323e41c38bfb7c6b5e50ccc97565d707a\"" Feb 12 20:25:22.157702 kubelet[1425]: E0212 20:25:22.157679 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:22.789873 kubelet[1425]: E0212 20:25:22.789819 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:22.921201 kubelet[1425]: E0212 20:25:22.921155 1425 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:23.790710 kubelet[1425]: E0212 20:25:23.790660 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:23.802701 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount474517926.mount: Deactivated successfully. Feb 12 20:25:24.791828 kubelet[1425]: E0212 20:25:24.791790 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:24.920929 kubelet[1425]: E0212 20:25:24.920824 1425 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:25.440476 env[1113]: time="2024-02-12T20:25:25.440408714Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:25.442366 env[1113]: time="2024-02-12T20:25:25.442333544Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:25.444241 env[1113]: time="2024-02-12T20:25:25.444211277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:25.445997 env[1113]: time="2024-02-12T20:25:25.445966599Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:25.446800 env[1113]: time="2024-02-12T20:25:25.446748385Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 20:25:25.447538 env[1113]: time="2024-02-12T20:25:25.447512699Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 20:25:25.448671 env[1113]: time="2024-02-12T20:25:25.448628051Z" level=info msg="CreateContainer within sandbox \"9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:25:25.461163 env[1113]: time="2024-02-12T20:25:25.461108321Z" level=info msg="CreateContainer within sandbox \"9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1bcd7ce02eef2b71d1442b1123175a5861322e38cce75d35dfc8f0d0d76b0f9e\"" Feb 12 20:25:25.461807 env[1113]: time="2024-02-12T20:25:25.461773638Z" level=info msg="StartContainer for \"1bcd7ce02eef2b71d1442b1123175a5861322e38cce75d35dfc8f0d0d76b0f9e\"" Feb 12 20:25:25.477579 systemd[1]: Started cri-containerd-1bcd7ce02eef2b71d1442b1123175a5861322e38cce75d35dfc8f0d0d76b0f9e.scope. Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f2288327a38 items=0 ppid=1537 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:25.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636437636530326565663262373164313434326231313233313735 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit: BPF prog-id=69 op=LOAD Feb 12 20:25:25.489000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002d5ba8 items=0 ppid=1537 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:25.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636437636530326565663262373164313434326231313233313735 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit: BPF prog-id=70 op=LOAD Feb 12 20:25:25.489000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002d5bf8 items=0 ppid=1537 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:25.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636437636530326565663262373164313434326231313233313735 Feb 12 20:25:25.489000 audit: BPF prog-id=70 op=UNLOAD Feb 12 20:25:25.489000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { perfmon } for pid=1619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit[1619]: AVC avc: denied { bpf } for pid=1619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:25.489000 audit: BPF prog-id=71 op=LOAD Feb 12 20:25:25.489000 audit[1619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002d5c88 items=0 ppid=1537 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:25.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636437636530326565663262373164313434326231313233313735 Feb 12 20:25:25.504205 env[1113]: time="2024-02-12T20:25:25.504138022Z" level=info msg="StartContainer for \"1bcd7ce02eef2b71d1442b1123175a5861322e38cce75d35dfc8f0d0d76b0f9e\" returns successfully" Feb 12 20:25:25.511260 systemd[1]: cri-containerd-1bcd7ce02eef2b71d1442b1123175a5861322e38cce75d35dfc8f0d0d76b0f9e.scope: Deactivated successfully. Feb 12 20:25:25.516000 audit: BPF prog-id=71 op=UNLOAD Feb 12 20:25:25.527030 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1bcd7ce02eef2b71d1442b1123175a5861322e38cce75d35dfc8f0d0d76b0f9e-rootfs.mount: Deactivated successfully. Feb 12 20:25:25.596488 env[1113]: time="2024-02-12T20:25:25.596431809Z" level=info msg="shim disconnected" id=1bcd7ce02eef2b71d1442b1123175a5861322e38cce75d35dfc8f0d0d76b0f9e Feb 12 20:25:25.596488 env[1113]: time="2024-02-12T20:25:25.596488886Z" level=warning msg="cleaning up after shim disconnected" id=1bcd7ce02eef2b71d1442b1123175a5861322e38cce75d35dfc8f0d0d76b0f9e namespace=k8s.io Feb 12 20:25:25.596719 env[1113]: time="2024-02-12T20:25:25.596503674Z" level=info msg="cleaning up dead shim" Feb 12 20:25:25.603040 env[1113]: time="2024-02-12T20:25:25.603005459Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:25:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1657 runtime=io.containerd.runc.v2\n" Feb 12 20:25:25.792816 kubelet[1425]: E0212 20:25:25.792794 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:25.956874 kubelet[1425]: E0212 20:25:25.956843 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:26.793507 kubelet[1425]: E0212 20:25:26.793460 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:26.880602 env[1113]: time="2024-02-12T20:25:26.880548965Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:26.882678 env[1113]: time="2024-02-12T20:25:26.882643945Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:26.884054 env[1113]: time="2024-02-12T20:25:26.884030596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:26.885373 env[1113]: time="2024-02-12T20:25:26.885351343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:26.885717 env[1113]: time="2024-02-12T20:25:26.885694778Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 20:25:26.886269 env[1113]: time="2024-02-12T20:25:26.886119083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:25:26.887040 env[1113]: time="2024-02-12T20:25:26.887011197Z" level=info msg="CreateContainer within sandbox \"141e4d571f9f5866a63965a6a72836d323e41c38bfb7c6b5e50ccc97565d707a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:25:26.898896 env[1113]: time="2024-02-12T20:25:26.898852868Z" level=info msg="CreateContainer within sandbox \"141e4d571f9f5866a63965a6a72836d323e41c38bfb7c6b5e50ccc97565d707a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"057aa5f9c26f0683057ad45a9d4ca47fe7d6eb4f32840510cfaf9a6a5fb5c926\"" Feb 12 20:25:26.899242 env[1113]: time="2024-02-12T20:25:26.899222422Z" level=info msg="StartContainer for \"057aa5f9c26f0683057ad45a9d4ca47fe7d6eb4f32840510cfaf9a6a5fb5c926\"" Feb 12 20:25:26.913868 systemd[1]: Started cri-containerd-057aa5f9c26f0683057ad45a9d4ca47fe7d6eb4f32840510cfaf9a6a5fb5c926.scope. Feb 12 20:25:26.921869 kubelet[1425]: E0212 20:25:26.921840 1425 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdbc424e7a8 items=0 ppid=1552 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035376161356639633236663036383330353761643435613964346361 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.924000 audit: BPF prog-id=72 op=LOAD Feb 12 20:25:26.924000 audit[1682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000391ef8 items=0 ppid=1552 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035376161356639633236663036383330353761643435613964346361 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit: BPF prog-id=73 op=LOAD Feb 12 20:25:26.925000 audit[1682]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000391f48 items=0 ppid=1552 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035376161356639633236663036383330353761643435613964346361 Feb 12 20:25:26.925000 audit: BPF prog-id=73 op=UNLOAD Feb 12 20:25:26.925000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { perfmon } for pid=1682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit[1682]: AVC avc: denied { bpf } for pid=1682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:26.925000 audit: BPF prog-id=74 op=LOAD Feb 12 20:25:26.925000 audit[1682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000391fd8 items=0 ppid=1552 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035376161356639633236663036383330353761643435613964346361 Feb 12 20:25:26.938722 env[1113]: time="2024-02-12T20:25:26.938678760Z" level=info msg="StartContainer for \"057aa5f9c26f0683057ad45a9d4ca47fe7d6eb4f32840510cfaf9a6a5fb5c926\" returns successfully" Feb 12 20:25:26.958218 kubelet[1425]: E0212 20:25:26.958187 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:26.967340 kubelet[1425]: I0212 20:25:26.967310 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-nsbnj" podStartSLOduration=-9.223372022887499e+09 pod.CreationTimestamp="2024-02-12 20:25:13 +0000 UTC" firstStartedPulling="2024-02-12 20:25:22.158022987 +0000 UTC m=+22.121734532" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:25:26.967145436 +0000 UTC m=+26.930857001" watchObservedRunningTime="2024-02-12 20:25:26.967276572 +0000 UTC m=+26.930988107" Feb 12 20:25:26.977000 audit[1731]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:26.977000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe45b63a80 a2=0 a3=7ffe45b63a6c items=0 ppid=1692 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:25:26.977000 audit[1732]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:26.977000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc123a3670 a2=0 a3=7ffc123a365c items=0 ppid=1692 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:25:26.978000 audit[1733]: NETFILTER_CFG table=nat:37 family=10 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:26.978000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd7414a70 a2=0 a3=7fffd7414a5c items=0 ppid=1692 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:25:26.978000 audit[1734]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:26.978000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd90ff0ec0 a2=0 a3=7ffd90ff0eac items=0 ppid=1692 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:25:26.979000 audit[1735]: NETFILTER_CFG table=filter:39 family=10 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:26.979000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6ed90fd0 a2=0 a3=7fff6ed90fbc items=0 ppid=1692 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:25:26.980000 audit[1736]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:26.980000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd5053850 a2=0 a3=7fffd505383c items=0 ppid=1692 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:26.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:25:27.082000 audit[1737]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.082000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdc4c90890 a2=0 a3=7ffdc4c9087c items=0 ppid=1692 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:25:27.085000 audit[1739]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.085000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe43fc3040 a2=0 a3=7ffe43fc302c items=0 ppid=1692 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:25:27.088000 audit[1742]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.088000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd08e7b050 a2=0 a3=7ffd08e7b03c items=0 ppid=1692 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:25:27.089000 audit[1743]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.089000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2d78cac0 a2=0 a3=7fff2d78caac items=0 ppid=1692 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:25:27.091000 audit[1745]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.091000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd25b6e7b0 a2=0 a3=7ffd25b6e79c items=0 ppid=1692 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:25:27.092000 audit[1746]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.092000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff29e01d40 a2=0 a3=7fff29e01d2c items=0 ppid=1692 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:25:27.094000 audit[1748]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.094000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcf36eb590 a2=0 a3=7ffcf36eb57c items=0 ppid=1692 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:25:27.097000 audit[1751]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.097000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc26310c20 a2=0 a3=7ffc26310c0c items=0 ppid=1692 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:25:27.098000 audit[1752]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.098000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3e05c7a0 a2=0 a3=7ffc3e05c78c items=0 ppid=1692 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:25:27.100000 audit[1754]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.100000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff7723baf0 a2=0 a3=7fff7723badc items=0 ppid=1692 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:25:27.101000 audit[1755]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.101000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6467f920 a2=0 a3=7ffd6467f90c items=0 ppid=1692 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:25:27.103000 audit[1757]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.103000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe40024920 a2=0 a3=7ffe4002490c items=0 ppid=1692 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:25:27.105000 audit[1760]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.105000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffde9f08b10 a2=0 a3=7ffde9f08afc items=0 ppid=1692 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:25:27.108000 audit[1763]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.108000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeaee8f670 a2=0 a3=7ffeaee8f65c items=0 ppid=1692 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:25:27.109000 audit[1764]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.109000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd02e06bf0 a2=0 a3=7ffd02e06bdc items=0 ppid=1692 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:25:27.111000 audit[1766]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.111000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd3939f310 a2=0 a3=7ffd3939f2fc items=0 ppid=1692 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:25:27.114000 audit[1769]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:27.114000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe2484e7a0 a2=0 a3=7ffe2484e78c items=0 ppid=1692 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:25:27.125000 audit[1773]: NETFILTER_CFG table=filter:58 family=2 entries=7 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:27.126967 kernel: kauditd_printk_skb: 260 callbacks suppressed Feb 12 20:25:27.127024 kernel: audit: type=1325 audit(1707769527.125:639): table=filter:58 family=2 entries=7 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:27.125000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcd275c970 a2=0 a3=7ffcd275c95c items=0 ppid=1692 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.131985 kernel: audit: type=1300 audit(1707769527.125:639): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcd275c970 a2=0 a3=7ffcd275c95c items=0 ppid=1692 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.132019 kernel: audit: type=1327 audit(1707769527.125:639): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:27.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:27.136000 audit[1773]: NETFILTER_CFG table=nat:59 family=2 entries=17 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:27.136000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcd275c970 a2=0 a3=7ffcd275c95c items=0 ppid=1692 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.141656 kernel: audit: type=1325 audit(1707769527.136:640): table=nat:59 family=2 entries=17 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:27.141693 kernel: audit: type=1300 audit(1707769527.136:640): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcd275c970 a2=0 a3=7ffcd275c95c items=0 ppid=1692 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.141711 kernel: audit: type=1327 audit(1707769527.136:640): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:27.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:27.149000 audit[1779]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.149000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe6fac8e50 a2=0 a3=7ffe6fac8e3c items=0 ppid=1692 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.155339 kernel: audit: type=1325 audit(1707769527.149:641): table=filter:60 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.155391 kernel: audit: type=1300 audit(1707769527.149:641): arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe6fac8e50 a2=0 a3=7ffe6fac8e3c items=0 ppid=1692 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.155414 kernel: audit: type=1327 audit(1707769527.149:641): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:25:27.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:25:27.152000 audit[1781]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.158535 kernel: audit: type=1325 audit(1707769527.152:642): table=filter:61 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.152000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc7dd17a0 a2=0 a3=7ffcc7dd178c items=0 ppid=1692 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:25:27.155000 audit[1784]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.155000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe13a35d10 a2=0 a3=7ffe13a35cfc items=0 ppid=1692 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:25:27.156000 audit[1785]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.156000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd374691b0 a2=0 a3=7ffd3746919c items=0 ppid=1692 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:25:27.159000 audit[1787]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.159000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff7fa3efb0 a2=0 a3=7fff7fa3ef9c items=0 ppid=1692 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:25:27.160000 audit[1788]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.160000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9c47eae0 a2=0 a3=7ffd9c47eacc items=0 ppid=1692 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:25:27.162000 audit[1790]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.162000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd33e23f10 a2=0 a3=7ffd33e23efc items=0 ppid=1692 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:25:27.165000 audit[1793]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.165000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe9d664db0 a2=0 a3=7ffe9d664d9c items=0 ppid=1692 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:25:27.166000 audit[1794]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.166000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff27345eb0 a2=0 a3=7fff27345e9c items=0 ppid=1692 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:25:27.168000 audit[1796]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.168000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4037eec0 a2=0 a3=7fff4037eeac items=0 ppid=1692 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:25:27.169000 audit[1797]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.169000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8b9cde00 a2=0 a3=7ffd8b9cddec items=0 ppid=1692 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:25:27.172000 audit[1799]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.172000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe97375dc0 a2=0 a3=7ffe97375dac items=0 ppid=1692 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:25:27.175000 audit[1802]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.175000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed75cb970 a2=0 a3=7ffed75cb95c items=0 ppid=1692 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:25:27.178000 audit[1805]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.178000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5b3a3ef0 a2=0 a3=7ffc5b3a3edc items=0 ppid=1692 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:25:27.179000 audit[1806]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.179000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe1d295ef0 a2=0 a3=7ffe1d295edc items=0 ppid=1692 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:25:27.181000 audit[1808]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.181000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd04f7cba0 a2=0 a3=7ffd04f7cb8c items=0 ppid=1692 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:25:27.184000 audit[1811]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:27.184000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd90c7c090 a2=0 a3=7ffd90c7c07c items=0 ppid=1692 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:25:27.189000 audit[1815]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:25:27.189000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc38386180 a2=0 a3=7ffc3838616c items=0 ppid=1692 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.189000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:27.190000 audit[1815]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:25:27.190000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc38386180 a2=0 a3=7ffc3838616c items=0 ppid=1692 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:27.190000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:27.793844 kubelet[1425]: E0212 20:25:27.793805 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:27.959882 kubelet[1425]: E0212 20:25:27.959859 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:28.224528 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3031356904.mount: Deactivated successfully. Feb 12 20:25:28.374000 audit[1841]: NETFILTER_CFG table=filter:79 family=2 entries=13 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:28.374000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffeb87d40b0 a2=0 a3=7ffeb87d409c items=0 ppid=1692 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:28.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:28.375000 audit[1841]: NETFILTER_CFG table=nat:80 family=2 entries=27 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:28.375000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffeb87d40b0 a2=0 a3=7ffeb87d409c items=0 ppid=1692 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:28.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:28.794131 kubelet[1425]: E0212 20:25:28.794091 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:28.921405 kubelet[1425]: E0212 20:25:28.921347 1425 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:29.794308 kubelet[1425]: E0212 20:25:29.794273 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:30.795046 kubelet[1425]: E0212 20:25:30.794983 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:30.920652 kubelet[1425]: E0212 20:25:30.920621 1425 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:31.026000 audit[1867]: NETFILTER_CFG table=filter:81 family=2 entries=12 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:31.026000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fffaa0ee600 a2=0 a3=7fffaa0ee5ec items=0 ppid=1692 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:31.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:31.026000 audit[1867]: NETFILTER_CFG table=nat:82 family=2 entries=30 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:31.026000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fffaa0ee600 a2=0 a3=7fffaa0ee5ec items=0 ppid=1692 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:31.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:31.055000 audit[1893]: NETFILTER_CFG table=filter:83 family=2 entries=9 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:31.055000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc00ae1830 a2=0 a3=7ffc00ae181c items=0 ppid=1692 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:31.055000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:31.059000 audit[1893]: NETFILTER_CFG table=nat:84 family=2 entries=63 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:31.059000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc00ae1830 a2=0 a3=7ffc00ae181c items=0 ppid=1692 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:31.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:31.796071 kubelet[1425]: E0212 20:25:31.796020 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:32.114892 env[1113]: time="2024-02-12T20:25:32.114696525Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:32.164762 env[1113]: time="2024-02-12T20:25:32.164708919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:32.201689 env[1113]: time="2024-02-12T20:25:32.201627525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:32.206572 env[1113]: time="2024-02-12T20:25:32.206538021Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:32.207461 env[1113]: time="2024-02-12T20:25:32.207423138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 20:25:32.209640 env[1113]: time="2024-02-12T20:25:32.209611935Z" level=info msg="CreateContainer within sandbox \"9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:25:32.221971 env[1113]: time="2024-02-12T20:25:32.221916871Z" level=info msg="CreateContainer within sandbox \"9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"2ae977977b6517b70354c50e4b8cfd4815b066d8b671c280ad3d22bcbe58920a\"" Feb 12 20:25:32.222444 env[1113]: time="2024-02-12T20:25:32.222397432Z" level=info msg="StartContainer for \"2ae977977b6517b70354c50e4b8cfd4815b066d8b671c280ad3d22bcbe58920a\"" Feb 12 20:25:32.237454 systemd[1]: Started cri-containerd-2ae977977b6517b70354c50e4b8cfd4815b066d8b671c280ad3d22bcbe58920a.scope. Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.250259 kernel: kauditd_printk_skb: 71 callbacks suppressed Feb 12 20:25:32.250314 kernel: audit: type=1400 audit(1707769532.248:666): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7302a7c518 items=0 ppid=1537 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:32.255790 kernel: audit: type=1300 audit(1707769532.248:666): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7302a7c518 items=0 ppid=1537 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:32.255843 kernel: audit: type=1327 audit(1707769532.248:666): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653937373937376236353137623730333534633530653462386366 Feb 12 20:25:32.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653937373937376236353137623730333534633530653462386366 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.260856 kernel: audit: type=1400 audit(1707769532.248:667): avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.260905 kernel: audit: type=1400 audit(1707769532.248:667): avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.262986 kernel: audit: type=1400 audit(1707769532.248:667): avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.265082 kernel: audit: type=1400 audit(1707769532.248:667): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.269535 kernel: audit: type=1400 audit(1707769532.248:667): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.269598 kernel: audit: type=1400 audit(1707769532.248:667): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.271667 kernel: audit: type=1400 audit(1707769532.248:667): avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.248000 audit: BPF prog-id=75 op=LOAD Feb 12 20:25:32.248000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000be218 items=0 ppid=1537 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:32.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653937373937376236353137623730333534633530653462386366 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.249000 audit: BPF prog-id=76 op=LOAD Feb 12 20:25:32.249000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000be268 items=0 ppid=1537 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:32.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653937373937376236353137623730333534633530653462386366 Feb 12 20:25:32.255000 audit: BPF prog-id=76 op=UNLOAD Feb 12 20:25:32.255000 audit: BPF prog-id=75 op=UNLOAD Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:32.255000 audit: BPF prog-id=77 op=LOAD Feb 12 20:25:32.255000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000be2f8 items=0 ppid=1537 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:32.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653937373937376236353137623730333534633530653462386366 Feb 12 20:25:32.275562 env[1113]: time="2024-02-12T20:25:32.275521373Z" level=info msg="StartContainer for \"2ae977977b6517b70354c50e4b8cfd4815b066d8b671c280ad3d22bcbe58920a\" returns successfully" Feb 12 20:25:32.797085 kubelet[1425]: E0212 20:25:32.797054 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:32.920991 kubelet[1425]: E0212 20:25:32.920755 1425 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:32.966649 kubelet[1425]: E0212 20:25:32.966628 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:33.797893 kubelet[1425]: E0212 20:25:33.797832 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:33.944121 systemd[1]: cri-containerd-2ae977977b6517b70354c50e4b8cfd4815b066d8b671c280ad3d22bcbe58920a.scope: Deactivated successfully. Feb 12 20:25:33.950000 audit: BPF prog-id=77 op=UNLOAD Feb 12 20:25:33.959674 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2ae977977b6517b70354c50e4b8cfd4815b066d8b671c280ad3d22bcbe58920a-rootfs.mount: Deactivated successfully. Feb 12 20:25:33.968266 kubelet[1425]: I0212 20:25:33.968228 1425 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:25:33.970204 kubelet[1425]: E0212 20:25:33.968669 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:34.403848 env[1113]: time="2024-02-12T20:25:34.403758132Z" level=info msg="shim disconnected" id=2ae977977b6517b70354c50e4b8cfd4815b066d8b671c280ad3d22bcbe58920a Feb 12 20:25:34.403848 env[1113]: time="2024-02-12T20:25:34.403840630Z" level=warning msg="cleaning up after shim disconnected" id=2ae977977b6517b70354c50e4b8cfd4815b066d8b671c280ad3d22bcbe58920a namespace=k8s.io Feb 12 20:25:34.403848 env[1113]: time="2024-02-12T20:25:34.403852031Z" level=info msg="cleaning up dead shim" Feb 12 20:25:34.409566 env[1113]: time="2024-02-12T20:25:34.409527836Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:25:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1954 runtime=io.containerd.runc.v2\n" Feb 12 20:25:34.797978 kubelet[1425]: E0212 20:25:34.797941 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:34.925102 systemd[1]: Created slice kubepods-besteffort-pod1740b60c_9243_442f_a724_6898e57f5ddc.slice. Feb 12 20:25:34.926922 env[1113]: time="2024-02-12T20:25:34.926885340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dh84x,Uid:1740b60c-9243-442f-a724-6898e57f5ddc,Namespace:calico-system,Attempt:0,}" Feb 12 20:25:34.971493 kubelet[1425]: E0212 20:25:34.971448 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:34.972148 env[1113]: time="2024-02-12T20:25:34.972101028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:25:35.233716 env[1113]: time="2024-02-12T20:25:35.233556686Z" level=error msg="Failed to destroy network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:35.234893 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129-shm.mount: Deactivated successfully. Feb 12 20:25:35.235142 env[1113]: time="2024-02-12T20:25:35.235064977Z" level=error msg="encountered an error cleaning up failed sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:35.235181 env[1113]: time="2024-02-12T20:25:35.235147825Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dh84x,Uid:1740b60c-9243-442f-a724-6898e57f5ddc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:35.235436 kubelet[1425]: E0212 20:25:35.235400 1425 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:35.235509 kubelet[1425]: E0212 20:25:35.235468 1425 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dh84x" Feb 12 20:25:35.235509 kubelet[1425]: E0212 20:25:35.235496 1425 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dh84x" Feb 12 20:25:35.235587 kubelet[1425]: E0212 20:25:35.235568 1425 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dh84x_calico-system(1740b60c-9243-442f-a724-6898e57f5ddc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dh84x_calico-system(1740b60c-9243-442f-a724-6898e57f5ddc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:35.799114 kubelet[1425]: E0212 20:25:35.799054 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:35.973650 kubelet[1425]: I0212 20:25:35.973619 1425 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:25:35.974335 env[1113]: time="2024-02-12T20:25:35.974293678Z" level=info msg="StopPodSandbox for \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\"" Feb 12 20:25:35.996301 env[1113]: time="2024-02-12T20:25:35.996227075Z" level=error msg="StopPodSandbox for \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\" failed" error="failed to destroy network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:35.996538 kubelet[1425]: E0212 20:25:35.996515 1425 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:25:35.996604 kubelet[1425]: E0212 20:25:35.996574 1425 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129} Feb 12 20:25:35.996634 kubelet[1425]: E0212 20:25:35.996611 1425 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1740b60c-9243-442f-a724-6898e57f5ddc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:25:35.996704 kubelet[1425]: E0212 20:25:35.996651 1425 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1740b60c-9243-442f-a724-6898e57f5ddc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dh84x" podUID=1740b60c-9243-442f-a724-6898e57f5ddc Feb 12 20:25:36.393691 kubelet[1425]: I0212 20:25:36.393624 1425 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:25:36.399165 systemd[1]: Created slice kubepods-besteffort-podc42a2766_1afa_474c_b072_4f18faba346c.slice. Feb 12 20:25:36.473555 kubelet[1425]: I0212 20:25:36.473504 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m8xrw\" (UniqueName: \"kubernetes.io/projected/c42a2766-1afa-474c-b072-4f18faba346c-kube-api-access-m8xrw\") pod \"nginx-deployment-8ffc5cf85-9czzv\" (UID: \"c42a2766-1afa-474c-b072-4f18faba346c\") " pod="default/nginx-deployment-8ffc5cf85-9czzv" Feb 12 20:25:36.702113 env[1113]: time="2024-02-12T20:25:36.701973122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9czzv,Uid:c42a2766-1afa-474c-b072-4f18faba346c,Namespace:default,Attempt:0,}" Feb 12 20:25:36.799595 kubelet[1425]: E0212 20:25:36.799551 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:36.844688 env[1113]: time="2024-02-12T20:25:36.844524601Z" level=error msg="Failed to destroy network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:36.845813 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571-shm.mount: Deactivated successfully. Feb 12 20:25:36.846507 env[1113]: time="2024-02-12T20:25:36.846467077Z" level=error msg="encountered an error cleaning up failed sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:36.846567 env[1113]: time="2024-02-12T20:25:36.846520890Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9czzv,Uid:c42a2766-1afa-474c-b072-4f18faba346c,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:36.846813 kubelet[1425]: E0212 20:25:36.846772 1425 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:36.846884 kubelet[1425]: E0212 20:25:36.846849 1425 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-9czzv" Feb 12 20:25:36.846973 kubelet[1425]: E0212 20:25:36.846894 1425 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-9czzv" Feb 12 20:25:36.847021 kubelet[1425]: E0212 20:25:36.846981 1425 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-9czzv_default(c42a2766-1afa-474c-b072-4f18faba346c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-9czzv_default(c42a2766-1afa-474c-b072-4f18faba346c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-9czzv" podUID=c42a2766-1afa-474c-b072-4f18faba346c Feb 12 20:25:36.976943 kubelet[1425]: I0212 20:25:36.976843 1425 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:25:36.977700 env[1113]: time="2024-02-12T20:25:36.977567768Z" level=info msg="StopPodSandbox for \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\"" Feb 12 20:25:37.026690 env[1113]: time="2024-02-12T20:25:37.026602302Z" level=error msg="StopPodSandbox for \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\" failed" error="failed to destroy network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:25:37.026933 kubelet[1425]: E0212 20:25:37.026866 1425 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:25:37.026933 kubelet[1425]: E0212 20:25:37.026903 1425 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571} Feb 12 20:25:37.027026 kubelet[1425]: E0212 20:25:37.026938 1425 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c42a2766-1afa-474c-b072-4f18faba346c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:25:37.027026 kubelet[1425]: E0212 20:25:37.026964 1425 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c42a2766-1afa-474c-b072-4f18faba346c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-9czzv" podUID=c42a2766-1afa-474c-b072-4f18faba346c Feb 12 20:25:37.800142 kubelet[1425]: E0212 20:25:37.800089 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:38.800694 kubelet[1425]: E0212 20:25:38.800637 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:39.801218 kubelet[1425]: E0212 20:25:39.801157 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:40.772506 kubelet[1425]: E0212 20:25:40.772423 1425 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:40.802302 kubelet[1425]: E0212 20:25:40.802212 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:41.802560 kubelet[1425]: E0212 20:25:41.802502 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:42.064545 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3439641119.mount: Deactivated successfully. Feb 12 20:25:42.112361 env[1113]: time="2024-02-12T20:25:42.112306607Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:42.113991 env[1113]: time="2024-02-12T20:25:42.113961517Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:42.115165 env[1113]: time="2024-02-12T20:25:42.115118723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:42.116464 env[1113]: time="2024-02-12T20:25:42.116406958Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:42.116885 env[1113]: time="2024-02-12T20:25:42.116854597Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 20:25:42.123923 env[1113]: time="2024-02-12T20:25:42.123868637Z" level=info msg="CreateContainer within sandbox \"9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:25:42.139326 env[1113]: time="2024-02-12T20:25:42.139250548Z" level=info msg="CreateContainer within sandbox \"9bb04fdcf6cda60d62f0c7125bd5f3ff2c99f8efb991431cbdef7c7299afdda5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a74e1aed07b238f6efc694278fab8972d674afd74bc98609c4cab08d89966477\"" Feb 12 20:25:42.139801 env[1113]: time="2024-02-12T20:25:42.139757930Z" level=info msg="StartContainer for \"a74e1aed07b238f6efc694278fab8972d674afd74bc98609c4cab08d89966477\"" Feb 12 20:25:42.161871 systemd[1]: Started cri-containerd-a74e1aed07b238f6efc694278fab8972d674afd74bc98609c4cab08d89966477.scope. Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.186458 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:25:42.186523 kernel: audit: type=1400 audit(1707769542.182:673): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.186547 kernel: audit: type=1300 audit(1707769542.182:673): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f35768f7cf8 items=0 ppid=1537 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:42.182000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f35768f7cf8 items=0 ppid=1537 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:42.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346531616564303762323338663665666336393432373866616238 Feb 12 20:25:42.192600 kernel: audit: type=1327 audit(1707769542.182:673): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346531616564303762323338663665666336393432373866616238 Feb 12 20:25:42.192708 kernel: audit: type=1400 audit(1707769542.182:674): avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.194706 kernel: audit: type=1400 audit(1707769542.182:674): avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.196641 kernel: audit: type=1400 audit(1707769542.182:674): avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.198637 kernel: audit: type=1400 audit(1707769542.182:674): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.202633 kernel: audit: type=1400 audit(1707769542.182:674): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.206779 kernel: audit: type=1400 audit(1707769542.182:674): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.206844 kernel: audit: type=1400 audit(1707769542.182:674): avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.182000 audit: BPF prog-id=78 op=LOAD Feb 12 20:25:42.182000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000096fe8 items=0 ppid=1537 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:42.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346531616564303762323338663665666336393432373866616238 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.184000 audit: BPF prog-id=79 op=LOAD Feb 12 20:25:42.184000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000097038 items=0 ppid=1537 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:42.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346531616564303762323338663665666336393432373866616238 Feb 12 20:25:42.190000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:25:42.190000 audit: BPF prog-id=78 op=UNLOAD Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:42.190000 audit: BPF prog-id=80 op=LOAD Feb 12 20:25:42.190000 audit[2097]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000970c8 items=0 ppid=1537 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:42.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346531616564303762323338663665666336393432373866616238 Feb 12 20:25:42.213327 update_engine[1104]: I0212 20:25:42.213300 1104 update_attempter.cc:509] Updating boot flags... Feb 12 20:25:42.224915 env[1113]: time="2024-02-12T20:25:42.224867542Z" level=info msg="StartContainer for \"a74e1aed07b238f6efc694278fab8972d674afd74bc98609c4cab08d89966477\" returns successfully" Feb 12 20:25:42.305258 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:25:42.305344 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:25:42.803582 kubelet[1425]: E0212 20:25:42.803528 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:42.988667 kubelet[1425]: E0212 20:25:42.988632 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:43.023112 kubelet[1425]: I0212 20:25:43.023047 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-2s2mt" podStartSLOduration=-9.223372006831783e+09 pod.CreationTimestamp="2024-02-12 20:25:13 +0000 UTC" firstStartedPulling="2024-02-12 20:25:22.15465006 +0000 UTC m=+22.118361605" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:25:43.021813835 +0000 UTC m=+42.985525380" watchObservedRunningTime="2024-02-12 20:25:43.022993182 +0000 UTC m=+42.986704737" Feb 12 20:25:43.533888 systemd[1]: run-containerd-runc-k8s.io-a74e1aed07b238f6efc694278fab8972d674afd74bc98609c4cab08d89966477-runc.kOhUcL.mount: Deactivated successfully. Feb 12 20:25:43.629000 audit[2243]: AVC avc: denied { write } for pid=2243 comm="tee" name="fd" dev="proc" ino=21714 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:25:43.629000 audit[2243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0496197b a2=241 a3=1b6 items=1 ppid=2223 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.629000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:25:43.629000 audit: PATH item=0 name="/dev/fd/63" inode=21709 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:43.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:25:43.643000 audit[2269]: AVC avc: denied { write } for pid=2269 comm="tee" name="fd" dev="proc" ino=22821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:25:43.643000 audit[2285]: AVC avc: denied { write } for pid=2285 comm="tee" name="fd" dev="proc" ino=21734 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:25:43.643000 audit[2285]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5464d97c a2=241 a3=1b6 items=1 ppid=2227 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.643000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:25:43.643000 audit: PATH item=0 name="/dev/fd/63" inode=22818 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:43.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:25:43.643000 audit[2271]: AVC avc: denied { write } for pid=2271 comm="tee" name="fd" dev="proc" ino=21738 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:25:43.643000 audit[2271]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2971698b a2=241 a3=1b6 items=1 ppid=2222 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.643000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:25:43.643000 audit: PATH item=0 name="/dev/fd/63" inode=19720 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:43.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:25:43.643000 audit[2269]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffc3a198b a2=241 a3=1b6 items=1 ppid=2231 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.643000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:25:43.643000 audit: PATH item=0 name="/dev/fd/63" inode=22814 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:43.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:25:43.649000 audit[2281]: AVC avc: denied { write } for pid=2281 comm="tee" name="fd" dev="proc" ino=22825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:25:43.649000 audit[2281]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8fe4798b a2=241 a3=1b6 items=1 ppid=2236 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.649000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:25:43.649000 audit: PATH item=0 name="/dev/fd/63" inode=22817 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:43.649000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:25:43.716000 audit[2295]: AVC avc: denied { write } for pid=2295 comm="tee" name="fd" dev="proc" ino=19729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:25:43.716000 audit[2295]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc71ab498d a2=241 a3=1b6 items=1 ppid=2234 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.716000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:25:43.716000 audit: PATH item=0 name="/dev/fd/63" inode=19726 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:43.716000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:25:43.736000 audit[2303]: AVC avc: denied { write } for pid=2303 comm="tee" name="fd" dev="proc" ino=19743 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:25:43.736000 audit[2303]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe76e2798c a2=241 a3=1b6 items=1 ppid=2251 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.736000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:25:43.736000 audit: PATH item=0 name="/dev/fd/63" inode=19740 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:43.736000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:25:43.836380 kubelet[1425]: E0212 20:25:43.835480 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:43.870806 kernel: Initializing XFRM netlink socket Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.950000 audit: BPF prog-id=81 op=LOAD Feb 12 20:25:43.950000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3b4488b0 a2=70 a3=7fb3fb86c000 items=0 ppid=2237 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.950000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:25:43.951000 audit: BPF prog-id=81 op=UNLOAD Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit: BPF prog-id=82 op=LOAD Feb 12 20:25:43.951000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc3b4488b0 a2=70 a3=6e items=0 ppid=2237 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:25:43.951000 audit: BPF prog-id=82 op=UNLOAD Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc3b448860 a2=70 a3=7ffc3b4488b0 items=0 ppid=2237 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit: BPF prog-id=83 op=LOAD Feb 12 20:25:43.951000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc3b448840 a2=70 a3=7ffc3b4488b0 items=0 ppid=2237 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:25:43.951000 audit: BPF prog-id=83 op=UNLOAD Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3b448920 a2=70 a3=0 items=0 ppid=2237 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc3b448910 a2=70 a3=0 items=0 ppid=2237 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc3b448950 a2=70 a3=0 items=0 ppid=2237 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.951000 audit: BPF prog-id=84 op=LOAD Feb 12 20:25:43.951000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc3b448870 a2=70 a3=ffffffff items=0 ppid=2237 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.951000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:25:43.954000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.954000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffccb33acc0 a2=70 a3=208 items=0 ppid=2237 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.954000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:25:43.955000 audit[2372]: AVC avc: denied { bpf } for pid=2372 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:43.955000 audit[2372]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffccb33ab90 a2=70 a3=3 items=0 ppid=2237 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:43.955000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:25:43.960000 audit: BPF prog-id=84 op=UNLOAD Feb 12 20:25:43.990073 kubelet[1425]: E0212 20:25:43.990036 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:25:44.002000 audit[2394]: NETFILTER_CFG table=nat:85 family=2 entries=16 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:25:44.002000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffff904b140 a2=0 a3=7ffff904b12c items=0 ppid=2237 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:44.002000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:25:44.003000 audit[2396]: NETFILTER_CFG table=filter:86 family=2 entries=39 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:25:44.003000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc85925e30 a2=0 a3=555c1ad58000 items=0 ppid=2237 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:44.003000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:25:44.004000 audit[2393]: NETFILTER_CFG table=raw:87 family=2 entries=19 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:25:44.004000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc11e188e0 a2=0 a3=55a3f2810000 items=0 ppid=2237 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:44.004000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:25:44.005000 audit[2395]: NETFILTER_CFG table=mangle:88 family=2 entries=19 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:25:44.005000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd8d77f7b0 a2=0 a3=559ae8fce000 items=0 ppid=2237 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:44.005000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:25:44.069345 systemd[1]: run-containerd-runc-k8s.io-a74e1aed07b238f6efc694278fab8972d674afd74bc98609c4cab08d89966477-runc.EQ4trO.mount: Deactivated successfully. Feb 12 20:25:44.836302 kubelet[1425]: E0212 20:25:44.836255 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:44.882138 systemd-networkd[1013]: vxlan.calico: Link UP Feb 12 20:25:44.882144 systemd-networkd[1013]: vxlan.calico: Gained carrier Feb 12 20:25:45.836502 kubelet[1425]: E0212 20:25:45.836460 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:46.540966 systemd-networkd[1013]: vxlan.calico: Gained IPv6LL Feb 12 20:25:46.837187 kubelet[1425]: E0212 20:25:46.837039 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:47.837343 kubelet[1425]: E0212 20:25:47.837274 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:47.921371 env[1113]: time="2024-02-12T20:25:47.921317329Z" level=info msg="StopPodSandbox for \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\"" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.974 [INFO][2448] k8s.go 578: Cleaning up netns ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.974 [INFO][2448] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" iface="eth0" netns="/var/run/netns/cni-72a6f67e-2d7f-c6f2-6c82-7d11106a264c" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.974 [INFO][2448] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" iface="eth0" netns="/var/run/netns/cni-72a6f67e-2d7f-c6f2-6c82-7d11106a264c" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.974 [INFO][2448] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" iface="eth0" netns="/var/run/netns/cni-72a6f67e-2d7f-c6f2-6c82-7d11106a264c" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.974 [INFO][2448] k8s.go 585: Releasing IP address(es) ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.974 [INFO][2448] utils.go 188: Calico CNI releasing IP address ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.993 [INFO][2456] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.993 [INFO][2456] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:47.993 [INFO][2456] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:48.017 [WARNING][2456] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:48.017 [INFO][2456] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:48.019 [INFO][2456] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:25:48.021119 env[1113]: 2024-02-12 20:25:48.020 [INFO][2448] k8s.go 591: Teardown processing complete. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:25:48.021628 env[1113]: time="2024-02-12T20:25:48.021328013Z" level=info msg="TearDown network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\" successfully" Feb 12 20:25:48.021628 env[1113]: time="2024-02-12T20:25:48.021368399Z" level=info msg="StopPodSandbox for \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\" returns successfully" Feb 12 20:25:48.022557 systemd[1]: run-netns-cni\x2d72a6f67e\x2d2d7f\x2dc6f2\x2d6c82\x2d7d11106a264c.mount: Deactivated successfully. Feb 12 20:25:48.023571 env[1113]: time="2024-02-12T20:25:48.023536007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9czzv,Uid:c42a2766-1afa-474c-b072-4f18faba346c,Namespace:default,Attempt:1,}" Feb 12 20:25:48.491115 systemd-networkd[1013]: cali556c127b252: Link UP Feb 12 20:25:48.505807 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:25:48.505950 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali556c127b252: link becomes ready Feb 12 20:25:48.506053 systemd-networkd[1013]: cali556c127b252: Gained carrier Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.383 [INFO][2464] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0 nginx-deployment-8ffc5cf85- default c42a2766-1afa-474c-b072-4f18faba346c 946 0 2024-02-12 20:25:36 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.86 nginx-deployment-8ffc5cf85-9czzv eth0 default [] [] [kns.default ksa.default.default] cali556c127b252 [] []}} ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9czzv" WorkloadEndpoint="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.383 [INFO][2464] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9czzv" WorkloadEndpoint="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.405 [INFO][2478] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" HandleID="k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.436 [INFO][2478] ipam_plugin.go 268: Auto assigning IP ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" HandleID="k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000cc380), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.86", "pod":"nginx-deployment-8ffc5cf85-9czzv", "timestamp":"2024-02-12 20:25:48.405864861 +0000 UTC"}, Hostname:"10.0.0.86", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.436 [INFO][2478] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.436 [INFO][2478] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.436 [INFO][2478] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.86' Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.437 [INFO][2478] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.442 [INFO][2478] ipam.go 372: Looking up existing affinities for host host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.457 [INFO][2478] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.468 [INFO][2478] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.470 [INFO][2478] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.470 [INFO][2478] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.471 [INFO][2478] ipam.go 1682: Creating new handle: k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96 Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.474 [INFO][2478] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.486 [INFO][2478] ipam.go 1216: Successfully claimed IPs: [192.168.21.193/26] block=192.168.21.192/26 handle="k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.486 [INFO][2478] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.193/26] handle="k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" host="10.0.0.86" Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.486 [INFO][2478] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:25:48.523200 env[1113]: 2024-02-12 20:25:48.486 [INFO][2478] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.193/26] IPv6=[] ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" HandleID="k8s-pod-network.186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.523880 env[1113]: 2024-02-12 20:25:48.489 [INFO][2464] k8s.go 385: Populated endpoint ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9czzv" WorkloadEndpoint="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"c42a2766-1afa-474c-b072-4f18faba346c", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-9czzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali556c127b252", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:25:48.523880 env[1113]: 2024-02-12 20:25:48.489 [INFO][2464] k8s.go 386: Calico CNI using IPs: [192.168.21.193/32] ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9czzv" WorkloadEndpoint="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.523880 env[1113]: 2024-02-12 20:25:48.489 [INFO][2464] dataplane_linux.go 68: Setting the host side veth name to cali556c127b252 ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9czzv" WorkloadEndpoint="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.523880 env[1113]: 2024-02-12 20:25:48.506 [INFO][2464] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9czzv" WorkloadEndpoint="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.523880 env[1113]: 2024-02-12 20:25:48.506 [INFO][2464] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9czzv" WorkloadEndpoint="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"c42a2766-1afa-474c-b072-4f18faba346c", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96", Pod:"nginx-deployment-8ffc5cf85-9czzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali556c127b252", MAC:"8a:c0:4f:2a:72:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:25:48.523880 env[1113]: 2024-02-12 20:25:48.521 [INFO][2464] k8s.go 491: Wrote updated endpoint to datastore ContainerID="186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9czzv" WorkloadEndpoint="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:25:48.531000 audit[2504]: NETFILTER_CFG table=filter:89 family=2 entries=36 op=nft_register_chain pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:25:48.536125 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 12 20:25:48.536188 kernel: audit: type=1325 audit(1707769548.531:704): table=filter:89 family=2 entries=36 op=nft_register_chain pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:25:48.536214 kernel: audit: type=1300 audit(1707769548.531:704): arch=c000003e syscall=46 success=yes exit=19876 a0=3 a1=7ffd523fbfe0 a2=0 a3=7ffd523fbfcc items=0 ppid=2237 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:48.531000 audit[2504]: SYSCALL arch=c000003e syscall=46 success=yes exit=19876 a0=3 a1=7ffd523fbfe0 a2=0 a3=7ffd523fbfcc items=0 ppid=2237 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:48.531000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:25:48.544224 env[1113]: time="2024-02-12T20:25:48.544163363Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:25:48.544224 env[1113]: time="2024-02-12T20:25:48.544196735Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:25:48.544224 env[1113]: time="2024-02-12T20:25:48.544205852Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:25:48.544459 env[1113]: time="2024-02-12T20:25:48.544306894Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96 pid=2512 runtime=io.containerd.runc.v2 Feb 12 20:25:48.549210 kernel: audit: type=1327 audit(1707769548.531:704): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:25:48.561235 systemd[1]: Started cri-containerd-186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96.scope. Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.576042 kernel: audit: type=1400 audit(1707769548.570:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.576093 kernel: audit: type=1400 audit(1707769548.570:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.576109 kernel: audit: type=1400 audit(1707769548.570:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578038 kernel: audit: type=1400 audit(1707769548.570:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580102 kernel: audit: type=1400 audit(1707769548.570:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.582170 kernel: audit: type=1400 audit(1707769548.570:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.586354 kernel: audit: type=1400 audit(1707769548.570:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit: BPF prog-id=85 op=LOAD Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:48.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366364643034303633323137653661363838613338613135626164 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:48.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366364643034303633323137653661363838613338613135626164 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.574000 audit: BPF prog-id=86 op=LOAD Feb 12 20:25:48.574000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003089a0 items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:48.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366364643034303633323137653661363838613338613135626164 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.578000 audit: BPF prog-id=87 op=LOAD Feb 12 20:25:48.578000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003089e8 items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:48.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366364643034303633323137653661363838613338613135626164 Feb 12 20:25:48.580000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:25:48.580000 audit: BPF prog-id=86 op=UNLOAD Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { perfmon } for pid=2523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit[2523]: AVC avc: denied { bpf } for pid=2523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:48.580000 audit: BPF prog-id=88 op=LOAD Feb 12 20:25:48.580000 audit[2523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000308df8 items=0 ppid=2512 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:48.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138366364643034303633323137653661363838613338613135626164 Feb 12 20:25:48.587302 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:25:48.606511 env[1113]: time="2024-02-12T20:25:48.606453320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9czzv,Uid:c42a2766-1afa-474c-b072-4f18faba346c,Namespace:default,Attempt:1,} returns sandbox id \"186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96\"" Feb 12 20:25:48.607644 env[1113]: time="2024-02-12T20:25:48.607589077Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 20:25:48.838313 kubelet[1425]: E0212 20:25:48.838182 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:49.838668 kubelet[1425]: E0212 20:25:49.838622 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:49.869100 systemd-networkd[1013]: cali556c127b252: Gained IPv6LL Feb 12 20:25:50.838888 kubelet[1425]: E0212 20:25:50.838846 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:50.921036 env[1113]: time="2024-02-12T20:25:50.920992314Z" level=info msg="StopPodSandbox for \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\"" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:50.968 [INFO][2570] k8s.go 578: Cleaning up netns ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:50.968 [INFO][2570] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" iface="eth0" netns="/var/run/netns/cni-322715a8-04d0-5730-adf8-34e7cc1c6963" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:50.968 [INFO][2570] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" iface="eth0" netns="/var/run/netns/cni-322715a8-04d0-5730-adf8-34e7cc1c6963" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:50.968 [INFO][2570] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" iface="eth0" netns="/var/run/netns/cni-322715a8-04d0-5730-adf8-34e7cc1c6963" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:50.968 [INFO][2570] k8s.go 585: Releasing IP address(es) ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:50.968 [INFO][2570] utils.go 188: Calico CNI releasing IP address ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:51.006 [INFO][2578] ipam_plugin.go 415: Releasing address using handleID ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:51.006 [INFO][2578] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:51.006 [INFO][2578] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:51.015 [WARNING][2578] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:51.015 [INFO][2578] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:51.017 [INFO][2578] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:25:51.020204 env[1113]: 2024-02-12 20:25:51.018 [INFO][2570] k8s.go 591: Teardown processing complete. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:25:51.020998 env[1113]: time="2024-02-12T20:25:51.020596804Z" level=info msg="TearDown network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\" successfully" Feb 12 20:25:51.020998 env[1113]: time="2024-02-12T20:25:51.020638372Z" level=info msg="StopPodSandbox for \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\" returns successfully" Feb 12 20:25:51.021925 systemd[1]: run-netns-cni\x2d322715a8\x2d04d0\x2d5730\x2dadf8\x2d34e7cc1c6963.mount: Deactivated successfully. Feb 12 20:25:51.022760 env[1113]: time="2024-02-12T20:25:51.022351757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dh84x,Uid:1740b60c-9243-442f-a724-6898e57f5ddc,Namespace:calico-system,Attempt:1,}" Feb 12 20:25:51.155304 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:25:51.155389 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid8dcd592004: link becomes ready Feb 12 20:25:51.155492 systemd-networkd[1013]: calid8dcd592004: Link UP Feb 12 20:25:51.155651 systemd-networkd[1013]: calid8dcd592004: Gained carrier Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.069 [INFO][2586] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.86-k8s-csi--node--driver--dh84x-eth0 csi-node-driver- calico-system 1740b60c-9243-442f-a724-6898e57f5ddc 959 0 2024-02-12 20:25:13 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.86 csi-node-driver-dh84x eth0 default [] [] [kns.calico-system ksa.calico-system.default] calid8dcd592004 [] []}} ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Namespace="calico-system" Pod="csi-node-driver-dh84x" WorkloadEndpoint="10.0.0.86-k8s-csi--node--driver--dh84x-" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.069 [INFO][2586] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Namespace="calico-system" Pod="csi-node-driver-dh84x" WorkloadEndpoint="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.101 [INFO][2600] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" HandleID="k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.124 [INFO][2600] ipam_plugin.go 268: Auto assigning IP ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" HandleID="k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bc0c0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.86", "pod":"csi-node-driver-dh84x", "timestamp":"2024-02-12 20:25:51.101182369 +0000 UTC"}, Hostname:"10.0.0.86", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.125 [INFO][2600] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.125 [INFO][2600] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.125 [INFO][2600] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.86' Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.127 [INFO][2600] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.132 [INFO][2600] ipam.go 372: Looking up existing affinities for host host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.136 [INFO][2600] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.138 [INFO][2600] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.140 [INFO][2600] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.140 [INFO][2600] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.141 [INFO][2600] ipam.go 1682: Creating new handle: k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5 Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.144 [INFO][2600] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.149 [INFO][2600] ipam.go 1216: Successfully claimed IPs: [192.168.21.194/26] block=192.168.21.192/26 handle="k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.149 [INFO][2600] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.194/26] handle="k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" host="10.0.0.86" Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.149 [INFO][2600] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:25:51.173795 env[1113]: 2024-02-12 20:25:51.149 [INFO][2600] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.194/26] IPv6=[] ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" HandleID="k8s-pod-network.55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.174406 env[1113]: 2024-02-12 20:25:51.150 [INFO][2586] k8s.go 385: Populated endpoint ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Namespace="calico-system" Pod="csi-node-driver-dh84x" WorkloadEndpoint="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-csi--node--driver--dh84x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1740b60c-9243-442f-a724-6898e57f5ddc", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"", Pod:"csi-node-driver-dh84x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid8dcd592004", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:25:51.174406 env[1113]: 2024-02-12 20:25:51.150 [INFO][2586] k8s.go 386: Calico CNI using IPs: [192.168.21.194/32] ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Namespace="calico-system" Pod="csi-node-driver-dh84x" WorkloadEndpoint="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.174406 env[1113]: 2024-02-12 20:25:51.150 [INFO][2586] dataplane_linux.go 68: Setting the host side veth name to calid8dcd592004 ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Namespace="calico-system" Pod="csi-node-driver-dh84x" WorkloadEndpoint="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.174406 env[1113]: 2024-02-12 20:25:51.156 [INFO][2586] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Namespace="calico-system" Pod="csi-node-driver-dh84x" WorkloadEndpoint="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.174406 env[1113]: 2024-02-12 20:25:51.156 [INFO][2586] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Namespace="calico-system" Pod="csi-node-driver-dh84x" WorkloadEndpoint="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-csi--node--driver--dh84x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1740b60c-9243-442f-a724-6898e57f5ddc", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5", Pod:"csi-node-driver-dh84x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid8dcd592004", MAC:"b6:fb:6e:e2:36:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:25:51.174406 env[1113]: 2024-02-12 20:25:51.169 [INFO][2586] k8s.go 491: Wrote updated endpoint to datastore ContainerID="55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5" Namespace="calico-system" Pod="csi-node-driver-dh84x" WorkloadEndpoint="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:25:51.182000 audit[2619]: NETFILTER_CFG table=filter:90 family=2 entries=40 op=nft_register_chain pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:25:51.182000 audit[2619]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffd06a58260 a2=0 a3=7ffd06a5824c items=0 ppid=2237 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:51.182000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:25:51.222679 env[1113]: time="2024-02-12T20:25:51.222480231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:25:51.222679 env[1113]: time="2024-02-12T20:25:51.222523703Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:25:51.222679 env[1113]: time="2024-02-12T20:25:51.222537179Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:25:51.223464 env[1113]: time="2024-02-12T20:25:51.223005943Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5 pid=2632 runtime=io.containerd.runc.v2 Feb 12 20:25:51.273956 systemd[1]: Started cri-containerd-55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5.scope. Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.287000 audit: BPF prog-id=89 op=LOAD Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2632 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:51.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646463663865373731633130633233323564346439623234626138 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2632 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:51.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646463663865373731633130633233323564346439623234626138 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit: BPF prog-id=90 op=LOAD Feb 12 20:25:51.288000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0002fc8c0 items=0 ppid=2632 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:51.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646463663865373731633130633233323564346439623234626138 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit: BPF prog-id=91 op=LOAD Feb 12 20:25:51.288000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0002fc908 items=0 ppid=2632 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:51.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646463663865373731633130633233323564346439623234626138 Feb 12 20:25:51.288000 audit: BPF prog-id=91 op=UNLOAD Feb 12 20:25:51.288000 audit: BPF prog-id=90 op=UNLOAD Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:51.288000 audit: BPF prog-id=92 op=LOAD Feb 12 20:25:51.288000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0002fcd18 items=0 ppid=2632 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:51.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535646463663865373731633130633233323564346439623234626138 Feb 12 20:25:51.290791 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:25:51.305235 env[1113]: time="2024-02-12T20:25:51.305187723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dh84x,Uid:1740b60c-9243-442f-a724-6898e57f5ddc,Namespace:calico-system,Attempt:1,} returns sandbox id \"55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5\"" Feb 12 20:25:51.839609 kubelet[1425]: E0212 20:25:51.839546 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:52.777078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2490143033.mount: Deactivated successfully. Feb 12 20:25:52.839902 kubelet[1425]: E0212 20:25:52.839850 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:53.012299 systemd-networkd[1013]: calid8dcd592004: Gained IPv6LL Feb 12 20:25:53.840309 kubelet[1425]: E0212 20:25:53.840268 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:54.841978 kubelet[1425]: E0212 20:25:54.841791 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:54.968428 env[1113]: time="2024-02-12T20:25:54.967797007Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:55.055227 env[1113]: time="2024-02-12T20:25:55.053834108Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:55.082097 env[1113]: time="2024-02-12T20:25:55.082040172Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:55.135225 env[1113]: time="2024-02-12T20:25:55.130896166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:25:55.135225 env[1113]: time="2024-02-12T20:25:55.131443137Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 20:25:55.135225 env[1113]: time="2024-02-12T20:25:55.133653844Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:25:55.135225 env[1113]: time="2024-02-12T20:25:55.134591983Z" level=info msg="CreateContainer within sandbox \"186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 20:25:55.375617 env[1113]: time="2024-02-12T20:25:55.375528168Z" level=info msg="CreateContainer within sandbox \"186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"67bfab121f93aedb192d179c442d1df0b391b4ebdf6c9c154d0dbc7b161cab87\"" Feb 12 20:25:55.376251 env[1113]: time="2024-02-12T20:25:55.376208711Z" level=info msg="StartContainer for \"67bfab121f93aedb192d179c442d1df0b391b4ebdf6c9c154d0dbc7b161cab87\"" Feb 12 20:25:55.394509 systemd[1]: run-containerd-runc-k8s.io-67bfab121f93aedb192d179c442d1df0b391b4ebdf6c9c154d0dbc7b161cab87-runc.IpmxsV.mount: Deactivated successfully. Feb 12 20:25:55.396281 systemd[1]: Started cri-containerd-67bfab121f93aedb192d179c442d1df0b391b4ebdf6c9c154d0dbc7b161cab87.scope. Feb 12 20:25:55.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.405928 kernel: kauditd_printk_skb: 110 callbacks suppressed Feb 12 20:25:55.405993 kernel: audit: type=1400 audit(1707769555.404:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.410035 kernel: audit: type=1400 audit(1707769555.404:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.410079 kernel: audit: type=1400 audit(1707769555.405:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.414563 kernel: audit: type=1400 audit(1707769555.405:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.414615 kernel: audit: type=1400 audit(1707769555.405:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.419897 kernel: audit: type=1400 audit(1707769555.405:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.419954 kernel: audit: type=1400 audit(1707769555.405:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.437053 kernel: audit: type=1400 audit(1707769555.405:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.437117 kernel: audit: type=1400 audit(1707769555.405:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.439063 kernel: audit: type=1400 audit(1707769555.407:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit: BPF prog-id=93 op=LOAD Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2512 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:55.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626661623132316639336165646231393264313739633434326431 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2512 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:55.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626661623132316639336165646231393264313739633434326431 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.407000 audit: BPF prog-id=94 op=LOAD Feb 12 20:25:55.407000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003d60d0 items=0 ppid=2512 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:55.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626661623132316639336165646231393264313739633434326431 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.411000 audit: BPF prog-id=95 op=LOAD Feb 12 20:25:55.411000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003d6118 items=0 ppid=2512 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:55.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626661623132316639336165646231393264313739633434326431 Feb 12 20:25:55.416000 audit: BPF prog-id=95 op=UNLOAD Feb 12 20:25:55.416000 audit: BPF prog-id=94 op=UNLOAD Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:55.416000 audit: BPF prog-id=96 op=LOAD Feb 12 20:25:55.416000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d6528 items=0 ppid=2512 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:55.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637626661623132316639336165646231393264313739633434326431 Feb 12 20:25:55.745122 env[1113]: time="2024-02-12T20:25:55.745066525Z" level=info msg="StartContainer for \"67bfab121f93aedb192d179c442d1df0b391b4ebdf6c9c154d0dbc7b161cab87\" returns successfully" Feb 12 20:25:55.842192 kubelet[1425]: E0212 20:25:55.842153 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:56.843235 kubelet[1425]: E0212 20:25:56.843177 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:57.786394 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2748840904.mount: Deactivated successfully. Feb 12 20:25:57.844295 kubelet[1425]: E0212 20:25:57.844232 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:58.845067 kubelet[1425]: E0212 20:25:58.845010 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:59.017000 audit[2761]: NETFILTER_CFG table=filter:91 family=2 entries=18 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:59.017000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fff3bdc0730 a2=0 a3=7fff3bdc071c items=0 ppid=1692 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:59.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:59.018000 audit[2761]: NETFILTER_CFG table=nat:92 family=2 entries=78 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:59.018000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff3bdc0730 a2=0 a3=7fff3bdc071c items=0 ppid=1692 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:59.018000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:59.060000 audit[2787]: NETFILTER_CFG table=filter:93 family=2 entries=30 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:59.060000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fff98c49670 a2=0 a3=7fff98c4965c items=0 ppid=1692 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:59.060000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:59.061000 audit[2787]: NETFILTER_CFG table=nat:94 family=2 entries=78 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:25:59.061000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff98c49670 a2=0 a3=7fff98c4965c items=0 ppid=1692 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:59.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:25:59.208857 kubelet[1425]: I0212 20:25:59.208716 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-9czzv" podStartSLOduration=-9.223372013646097e+09 pod.CreationTimestamp="2024-02-12 20:25:36 +0000 UTC" firstStartedPulling="2024-02-12 20:25:48.607381405 +0000 UTC m=+48.571092950" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:25:56.031362257 +0000 UTC m=+55.995073832" watchObservedRunningTime="2024-02-12 20:25:59.20867918 +0000 UTC m=+59.172390726" Feb 12 20:25:59.208857 kubelet[1425]: I0212 20:25:59.208825 1425 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:25:59.213273 systemd[1]: Created slice kubepods-besteffort-pod51b62d18_53a3_4aec_9d12_7f6d91b1c6d9.slice. Feb 12 20:25:59.403596 kubelet[1425]: I0212 20:25:59.403488 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x7xdl\" (UniqueName: \"kubernetes.io/projected/51b62d18-53a3-4aec-9d12-7f6d91b1c6d9-kube-api-access-x7xdl\") pod \"nfs-server-provisioner-0\" (UID: \"51b62d18-53a3-4aec-9d12-7f6d91b1c6d9\") " pod="default/nfs-server-provisioner-0" Feb 12 20:25:59.403596 kubelet[1425]: I0212 20:25:59.403601 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/51b62d18-53a3-4aec-9d12-7f6d91b1c6d9-data\") pod \"nfs-server-provisioner-0\" (UID: \"51b62d18-53a3-4aec-9d12-7f6d91b1c6d9\") " pod="default/nfs-server-provisioner-0" Feb 12 20:25:59.816116 env[1113]: time="2024-02-12T20:25:59.816061451Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:51b62d18-53a3-4aec-9d12-7f6d91b1c6d9,Namespace:default,Attempt:0,}" Feb 12 20:25:59.845351 kubelet[1425]: E0212 20:25:59.845279 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:00.312730 env[1113]: time="2024-02-12T20:26:00.312655478Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:00.358137 env[1113]: time="2024-02-12T20:26:00.358091847Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:00.392850 env[1113]: time="2024-02-12T20:26:00.392798956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:00.402794 env[1113]: time="2024-02-12T20:26:00.402727137Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:00.403327 env[1113]: time="2024-02-12T20:26:00.403291419Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 20:26:00.404651 env[1113]: time="2024-02-12T20:26:00.404615362Z" level=info msg="CreateContainer within sandbox \"55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:26:00.487496 systemd-networkd[1013]: cali60e51b789ff: Link UP Feb 12 20:26:00.493844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:26:00.493942 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 20:26:00.494688 systemd-networkd[1013]: cali60e51b789ff: Gained carrier Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.426 [INFO][2789] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.86-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 51b62d18-53a3-4aec-9d12-7f6d91b1c6d9 1003 0 2024-02-12 20:25:59 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.86 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.86-k8s-nfs--server--provisioner--0-" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.426 [INFO][2789] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.447 [INFO][2803] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" HandleID="k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Workload="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.457 [INFO][2803] ipam_plugin.go 268: Auto assigning IP ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" HandleID="k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Workload="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029f020), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.86", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 20:26:00.447131522 +0000 UTC"}, Hostname:"10.0.0.86", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.457 [INFO][2803] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.457 [INFO][2803] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.457 [INFO][2803] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.86' Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.459 [INFO][2803] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.462 [INFO][2803] ipam.go 372: Looking up existing affinities for host host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.466 [INFO][2803] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.467 [INFO][2803] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.469 [INFO][2803] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.470 [INFO][2803] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.471 [INFO][2803] ipam.go 1682: Creating new handle: k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.475 [INFO][2803] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.483 [INFO][2803] ipam.go 1216: Successfully claimed IPs: [192.168.21.195/26] block=192.168.21.192/26 handle="k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.483 [INFO][2803] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.195/26] handle="k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" host="10.0.0.86" Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.483 [INFO][2803] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:00.609320 env[1113]: 2024-02-12 20:26:00.483 [INFO][2803] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.195/26] IPv6=[] ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" HandleID="k8s-pod-network.5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Workload="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:00.609987 env[1113]: 2024-02-12 20:26:00.486 [INFO][2789] k8s.go 385: Populated endpoint ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"51b62d18-53a3-4aec-9d12-7f6d91b1c6d9", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.21.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:00.609987 env[1113]: 2024-02-12 20:26:00.486 [INFO][2789] k8s.go 386: Calico CNI using IPs: [192.168.21.195/32] ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:00.609987 env[1113]: 2024-02-12 20:26:00.486 [INFO][2789] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:00.609987 env[1113]: 2024-02-12 20:26:00.494 [INFO][2789] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:00.610180 env[1113]: 2024-02-12 20:26:00.495 [INFO][2789] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"51b62d18-53a3-4aec-9d12-7f6d91b1c6d9", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.21.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"4a:75:86:b6:5d:2e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:00.610180 env[1113]: 2024-02-12 20:26:00.606 [INFO][2789] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.86-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:00.618000 audit[2829]: NETFILTER_CFG table=filter:95 family=2 entries=38 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:00.620364 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 12 20:26:00.620419 kernel: audit: type=1325 audit(1707769560.618:764): table=filter:95 family=2 entries=38 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:00.618000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffca9647d70 a2=0 a3=7ffca9647d5c items=0 ppid=2237 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.625249 kernel: audit: type=1300 audit(1707769560.618:764): arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffca9647d70 a2=0 a3=7ffca9647d5c items=0 ppid=2237 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.625303 kernel: audit: type=1327 audit(1707769560.618:764): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:00.618000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:00.681122 env[1113]: time="2024-02-12T20:26:00.681040096Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:26:00.681122 env[1113]: time="2024-02-12T20:26:00.681088116Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:26:00.681122 env[1113]: time="2024-02-12T20:26:00.681101451Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:26:00.681359 env[1113]: time="2024-02-12T20:26:00.681267124Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d pid=2837 runtime=io.containerd.runc.v2 Feb 12 20:26:00.697120 systemd[1]: Started cri-containerd-5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d.scope. Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.716000 kernel: audit: type=1400 audit(1707769560.706:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.716071 kernel: audit: type=1400 audit(1707769560.706:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.716098 kernel: audit: type=1400 audit(1707769560.706:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.719982 kernel: audit: type=1400 audit(1707769560.706:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.720174 env[1113]: time="2024-02-12T20:26:00.720109918Z" level=info msg="CreateContainer within sandbox \"55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"43ab7d27f489644ca502aa4deac2ee4d26d66e0974dcbc9999f969aad1b37e55\"" Feb 12 20:26:00.723801 kernel: audit: type=1400 audit(1707769560.706:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.723874 kernel: audit: type=1400 audit(1707769560.706:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.723997 env[1113]: time="2024-02-12T20:26:00.722518744Z" level=info msg="StartContainer for \"43ab7d27f489644ca502aa4deac2ee4d26d66e0974dcbc9999f969aad1b37e55\"" Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.734856 kernel: audit: type=1400 audit(1707769560.706:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit: BPF prog-id=97 op=LOAD Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633030646235633161366231313965386562616331613362313762 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633030646235633161366231313965386562616331613362313762 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.715000 audit: BPF prog-id=98 op=LOAD Feb 12 20:26:00.715000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001d5d30 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633030646235633161366231313965386562616331613362313762 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.717000 audit: BPF prog-id=99 op=LOAD Feb 12 20:26:00.717000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001d5d78 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633030646235633161366231313965386562616331613362313762 Feb 12 20:26:00.723000 audit: BPF prog-id=99 op=UNLOAD Feb 12 20:26:00.723000 audit: BPF prog-id=98 op=UNLOAD Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.727000 audit: BPF prog-id=100 op=LOAD Feb 12 20:26:00.727000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003be188 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562633030646235633161366231313965386562616331613362313762 Feb 12 20:26:00.735837 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:26:00.748514 systemd[1]: Started cri-containerd-43ab7d27f489644ca502aa4deac2ee4d26d66e0974dcbc9999f969aad1b37e55.scope. Feb 12 20:26:00.759067 env[1113]: time="2024-02-12T20:26:00.759016704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:51b62d18-53a3-4aec-9d12-7f6d91b1c6d9,Namespace:default,Attempt:0,} returns sandbox id \"5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d\"" Feb 12 20:26:00.760428 env[1113]: time="2024-02-12T20:26:00.760393156Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f322834b7e8 items=0 ppid=2632 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433616237643237663438393634346361353032616134646561633265 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit: BPF prog-id=101 op=LOAD Feb 12 20:26:00.763000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a8e48 items=0 ppid=2632 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433616237643237663438393634346361353032616134646561633265 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.763000 audit: BPF prog-id=102 op=LOAD Feb 12 20:26:00.763000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a8e98 items=0 ppid=2632 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433616237643237663438393634346361353032616134646561633265 Feb 12 20:26:00.763000 audit: BPF prog-id=102 op=UNLOAD Feb 12 20:26:00.763000 audit: BPF prog-id=101 op=UNLOAD Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:00.764000 audit: BPF prog-id=103 op=LOAD Feb 12 20:26:00.764000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a8f28 items=0 ppid=2632 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:00.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433616237643237663438393634346361353032616134646561633265 Feb 12 20:26:00.772932 kubelet[1425]: E0212 20:26:00.772894 1425 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:00.845805 kubelet[1425]: E0212 20:26:00.845747 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:00.875078 env[1113]: time="2024-02-12T20:26:00.874078869Z" level=info msg="StartContainer for \"43ab7d27f489644ca502aa4deac2ee4d26d66e0974dcbc9999f969aad1b37e55\" returns successfully" Feb 12 20:26:00.875462 env[1113]: time="2024-02-12T20:26:00.875437416Z" level=info msg="StopPodSandbox for \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\"" Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.907 [WARNING][2922] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"c42a2766-1afa-474c-b072-4f18faba346c", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96", Pod:"nginx-deployment-8ffc5cf85-9czzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali556c127b252", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.908 [INFO][2922] k8s.go 578: Cleaning up netns ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.908 [INFO][2922] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" iface="eth0" netns="" Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.908 [INFO][2922] k8s.go 585: Releasing IP address(es) ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.908 [INFO][2922] utils.go 188: Calico CNI releasing IP address ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.925 [INFO][2930] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.925 [INFO][2930] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.925 [INFO][2930] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.932 [WARNING][2930] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.932 [INFO][2930] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.933 [INFO][2930] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:00.936029 env[1113]: 2024-02-12 20:26:00.934 [INFO][2922] k8s.go 591: Teardown processing complete. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:26:00.936610 env[1113]: time="2024-02-12T20:26:00.936055355Z" level=info msg="TearDown network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\" successfully" Feb 12 20:26:00.936610 env[1113]: time="2024-02-12T20:26:00.936093677Z" level=info msg="StopPodSandbox for \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\" returns successfully" Feb 12 20:26:00.936801 env[1113]: time="2024-02-12T20:26:00.936748280Z" level=info msg="RemovePodSandbox for \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\"" Feb 12 20:26:00.936964 env[1113]: time="2024-02-12T20:26:00.936801620Z" level=info msg="Forcibly stopping sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\"" Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.082 [WARNING][2953] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"c42a2766-1afa-474c-b072-4f18faba346c", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"186cdd04063217e6a688a38a15bad02297ca12b04f9f564ea5c03d2ee07cba96", Pod:"nginx-deployment-8ffc5cf85-9czzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali556c127b252", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.082 [INFO][2953] k8s.go 578: Cleaning up netns ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.082 [INFO][2953] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" iface="eth0" netns="" Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.082 [INFO][2953] k8s.go 585: Releasing IP address(es) ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.082 [INFO][2953] utils.go 188: Calico CNI releasing IP address ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.100 [INFO][2961] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.100 [INFO][2961] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.100 [INFO][2961] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.107 [WARNING][2961] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.107 [INFO][2961] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" HandleID="k8s-pod-network.6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Workload="10.0.0.86-k8s-nginx--deployment--8ffc5cf85--9czzv-eth0" Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.108 [INFO][2961] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:01.110280 env[1113]: 2024-02-12 20:26:01.109 [INFO][2953] k8s.go 591: Teardown processing complete. ContainerID="6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571" Feb 12 20:26:01.110781 env[1113]: time="2024-02-12T20:26:01.110350425Z" level=info msg="TearDown network for sandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\" successfully" Feb 12 20:26:01.146915 env[1113]: time="2024-02-12T20:26:01.146792856Z" level=info msg="RemovePodSandbox \"6e7328f93517792061cc227ade83b08b689fbbd2513ecb8fd94623896e653571\" returns successfully" Feb 12 20:26:01.147439 env[1113]: time="2024-02-12T20:26:01.147409345Z" level=info msg="StopPodSandbox for \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\"" Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.184 [WARNING][2983] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-csi--node--driver--dh84x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1740b60c-9243-442f-a724-6898e57f5ddc", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5", Pod:"csi-node-driver-dh84x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid8dcd592004", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.184 [INFO][2983] k8s.go 578: Cleaning up netns ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.184 [INFO][2983] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" iface="eth0" netns="" Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.184 [INFO][2983] k8s.go 585: Releasing IP address(es) ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.184 [INFO][2983] utils.go 188: Calico CNI releasing IP address ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.202 [INFO][2990] ipam_plugin.go 415: Releasing address using handleID ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.202 [INFO][2990] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.202 [INFO][2990] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.208 [WARNING][2990] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.209 [INFO][2990] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.210 [INFO][2990] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:01.212532 env[1113]: 2024-02-12 20:26:01.211 [INFO][2983] k8s.go 591: Teardown processing complete. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:26:01.212995 env[1113]: time="2024-02-12T20:26:01.212555912Z" level=info msg="TearDown network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\" successfully" Feb 12 20:26:01.212995 env[1113]: time="2024-02-12T20:26:01.212595026Z" level=info msg="StopPodSandbox for \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\" returns successfully" Feb 12 20:26:01.213084 env[1113]: time="2024-02-12T20:26:01.213049091Z" level=info msg="RemovePodSandbox for \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\"" Feb 12 20:26:01.213117 env[1113]: time="2024-02-12T20:26:01.213088425Z" level=info msg="Forcibly stopping sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\"" Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.245 [WARNING][3012] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-csi--node--driver--dh84x-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1740b60c-9243-442f-a724-6898e57f5ddc", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5", Pod:"csi-node-driver-dh84x", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid8dcd592004", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.245 [INFO][3012] k8s.go 578: Cleaning up netns ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.245 [INFO][3012] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" iface="eth0" netns="" Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.245 [INFO][3012] k8s.go 585: Releasing IP address(es) ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.245 [INFO][3012] utils.go 188: Calico CNI releasing IP address ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.261 [INFO][3019] ipam_plugin.go 415: Releasing address using handleID ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.261 [INFO][3019] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.261 [INFO][3019] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.267 [WARNING][3019] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.267 [INFO][3019] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" HandleID="k8s-pod-network.d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Workload="10.0.0.86-k8s-csi--node--driver--dh84x-eth0" Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.269 [INFO][3019] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:01.272274 env[1113]: 2024-02-12 20:26:01.270 [INFO][3012] k8s.go 591: Teardown processing complete. ContainerID="d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129" Feb 12 20:26:01.272274 env[1113]: time="2024-02-12T20:26:01.272310850Z" level=info msg="TearDown network for sandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\" successfully" Feb 12 20:26:01.436565 env[1113]: time="2024-02-12T20:26:01.436376258Z" level=info msg="RemovePodSandbox \"d0ac681f048c7ecbaa79c7033bfaae36aedb36a9aab3e9c9141a6249dbeec129\" returns successfully" Feb 12 20:26:01.846730 kubelet[1425]: E0212 20:26:01.846686 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:02.348964 systemd-networkd[1013]: cali60e51b789ff: Gained IPv6LL Feb 12 20:26:02.847288 kubelet[1425]: E0212 20:26:02.847235 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:03.847894 kubelet[1425]: E0212 20:26:03.847825 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:04.840433 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount491685081.mount: Deactivated successfully. Feb 12 20:26:04.848777 kubelet[1425]: E0212 20:26:04.848736 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:05.849842 kubelet[1425]: E0212 20:26:05.849809 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:06.849964 kubelet[1425]: E0212 20:26:06.849902 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:07.850795 kubelet[1425]: E0212 20:26:07.850741 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:08.851330 kubelet[1425]: E0212 20:26:08.851287 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:09.179174 env[1113]: time="2024-02-12T20:26:09.179052214Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:09.203338 env[1113]: time="2024-02-12T20:26:09.203314227Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:09.221649 env[1113]: time="2024-02-12T20:26:09.221620735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:09.301607 env[1113]: time="2024-02-12T20:26:09.301559404Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:09.302237 env[1113]: time="2024-02-12T20:26:09.302204627Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 20:26:09.302803 env[1113]: time="2024-02-12T20:26:09.302756254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:26:09.303658 env[1113]: time="2024-02-12T20:26:09.303630346Z" level=info msg="CreateContainer within sandbox \"5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 20:26:09.820282 env[1113]: time="2024-02-12T20:26:09.820216010Z" level=info msg="CreateContainer within sandbox \"5bc00db5c1a6b119e8ebac1a3b17be46adc4c1fef56fa232d6e71aaeee3c384d\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"d03b08b419997c5e47af7b1219617b95bb6ba49ec3fc32f8eecb07d999139359\"" Feb 12 20:26:09.820835 env[1113]: time="2024-02-12T20:26:09.820807182Z" level=info msg="StartContainer for \"d03b08b419997c5e47af7b1219617b95bb6ba49ec3fc32f8eecb07d999139359\"" Feb 12 20:26:09.837816 systemd[1]: Started cri-containerd-d03b08b419997c5e47af7b1219617b95bb6ba49ec3fc32f8eecb07d999139359.scope. Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850242 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 12 20:26:09.850311 kernel: audit: type=1400 audit(1707769569.846:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850343 kernel: audit: type=1400 audit(1707769569.846:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.853065 kubelet[1425]: E0212 20:26:09.852976 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:09.855709 kernel: audit: type=1400 audit(1707769569.846:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.855792 kernel: audit: type=1400 audit(1707769569.846:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.861127 kernel: audit: type=1400 audit(1707769569.846:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.861184 kernel: audit: type=1400 audit(1707769569.846:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.866636 kernel: audit: type=1400 audit(1707769569.846:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.866680 kernel: audit: type=1400 audit(1707769569.846:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.872029 kernel: audit: type=1400 audit(1707769569.846:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.872075 kernel: audit: type=1400 audit(1707769569.849:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.849000 audit: BPF prog-id=104 op=LOAD Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2837 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336230386234313939393763356534376166376231323139363137 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2837 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336230386234313939393763356534376166376231323139363137 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.850000 audit: BPF prog-id=105 op=LOAD Feb 12 20:26:09.850000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0002b0ff0 items=0 ppid=2837 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336230386234313939393763356534376166376231323139363137 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.854000 audit: BPF prog-id=106 op=LOAD Feb 12 20:26:09.854000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0002b1038 items=0 ppid=2837 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336230386234313939393763356534376166376231323139363137 Feb 12 20:26:09.857000 audit: BPF prog-id=106 op=UNLOAD Feb 12 20:26:09.857000 audit: BPF prog-id=105 op=UNLOAD Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.857000 audit: BPF prog-id=107 op=LOAD Feb 12 20:26:09.857000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0002b1448 items=0 ppid=2837 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336230386234313939393763356534376166376231323139363137 Feb 12 20:26:09.917000 audit[3073]: AVC avc: denied { search } for pid=3073 comm="rpcbind" name="crypto" dev="proc" ino=24665 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:26:09.917000 audit[3073]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff24f6a60c0 a2=0 a3=0 items=0 ppid=3055 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 key=(null) Feb 12 20:26:09.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 20:26:09.938665 env[1113]: time="2024-02-12T20:26:09.938616671Z" level=info msg="StartContainer for \"d03b08b419997c5e47af7b1219617b95bb6ba49ec3fc32f8eecb07d999139359\" returns successfully" Feb 12 20:26:10.041000 audit[3078]: AVC avc: denied { search } for pid=3078 comm="dbus-daemon" name="crypto" dev="proc" ino=24665 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:26:10.041000 audit[3078]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f273d12a0c0 a2=0 a3=0 items=0 ppid=3055 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 key=(null) Feb 12 20:26:10.041000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 20:26:10.043000 audit[3079]: AVC avc: denied { watch } for pid=3079 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537957 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c183,c225 tclass=dir permissive=0 Feb 12 20:26:10.043000 audit[3079]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=564a443fe7e0 a2=2c8 a3=7fffd542812c items=0 ppid=3055 pid=3079 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 key=(null) Feb 12 20:26:10.043000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 20:26:10.057000 audit[3080]: AVC avc: denied { read } for pid=3080 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25659 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 20:26:10.057000 audit[3080]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7ff15eccb320 a1=80000 a2=d a3=7ffeccc5f8f0 items=0 ppid=3055 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 key=(null) Feb 12 20:26:10.057000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 20:26:10.058000 audit[3080]: AVC avc: denied { search } for pid=3080 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24665 scontext=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:26:10.058000 audit[3080]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff15e21f0c0 a2=0 a3=0 items=0 ppid=3055 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c183,c225 key=(null) Feb 12 20:26:10.058000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 20:26:10.060457 kubelet[1425]: I0212 20:26:10.060428 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372025794386e+09 pod.CreationTimestamp="2024-02-12 20:25:59 +0000 UTC" firstStartedPulling="2024-02-12 20:26:00.760093732 +0000 UTC m=+60.723805277" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:10.059827 +0000 UTC m=+70.023538565" watchObservedRunningTime="2024-02-12 20:26:10.060389046 +0000 UTC m=+70.024100591" Feb 12 20:26:10.158000 audit[3106]: NETFILTER_CFG table=filter:96 family=2 entries=18 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:10.158000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcc551b5a0 a2=0 a3=7ffcc551b58c items=0 ppid=1692 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:10.158000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:10.162000 audit[3106]: NETFILTER_CFG table=nat:97 family=2 entries=162 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:10.162000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffcc551b5a0 a2=0 a3=7ffcc551b58c items=0 ppid=1692 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:10.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:10.853841 kubelet[1425]: E0212 20:26:10.853799 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:11.854635 kubelet[1425]: E0212 20:26:11.854591 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:12.711826 env[1113]: time="2024-02-12T20:26:12.711775166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:12.713677 env[1113]: time="2024-02-12T20:26:12.713629611Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:12.715387 env[1113]: time="2024-02-12T20:26:12.715361695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:12.716826 env[1113]: time="2024-02-12T20:26:12.716796872Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:12.717173 env[1113]: time="2024-02-12T20:26:12.717139094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 20:26:12.718706 env[1113]: time="2024-02-12T20:26:12.718674790Z" level=info msg="CreateContainer within sandbox \"55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:26:12.732372 env[1113]: time="2024-02-12T20:26:12.732331228Z" level=info msg="CreateContainer within sandbox \"55ddcf8e771c10c2325d4d9b24ba89b0b6ecc33da312dcec97affac4a12e94a5\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"6a98a2ad3c8b15bb8dabcc7496c97ea9134e22855c31383488b2a00940dc2b84\"" Feb 12 20:26:12.732679 env[1113]: time="2024-02-12T20:26:12.732649436Z" level=info msg="StartContainer for \"6a98a2ad3c8b15bb8dabcc7496c97ea9134e22855c31383488b2a00940dc2b84\"" Feb 12 20:26:12.748782 systemd[1]: run-containerd-runc-k8s.io-6a98a2ad3c8b15bb8dabcc7496c97ea9134e22855c31383488b2a00940dc2b84-runc.fMCgxn.mount: Deactivated successfully. Feb 12 20:26:12.752679 systemd[1]: Started cri-containerd-6a98a2ad3c8b15bb8dabcc7496c97ea9134e22855c31383488b2a00940dc2b84.scope. Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f68c84172f8 items=0 ppid=2632 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:12.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393861326164336338623135626238646162636337343936633937 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit: BPF prog-id=108 op=LOAD Feb 12 20:26:12.761000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024238 items=0 ppid=2632 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:12.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393861326164336338623135626238646162636337343936633937 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit: BPF prog-id=109 op=LOAD Feb 12 20:26:12.761000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024288 items=0 ppid=2632 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:12.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393861326164336338623135626238646162636337343936633937 Feb 12 20:26:12.761000 audit: BPF prog-id=109 op=UNLOAD Feb 12 20:26:12.761000 audit: BPF prog-id=108 op=UNLOAD Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:12.761000 audit: BPF prog-id=110 op=LOAD Feb 12 20:26:12.761000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024318 items=0 ppid=2632 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:12.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661393861326164336338623135626238646162636337343936633937 Feb 12 20:26:12.774727 env[1113]: time="2024-02-12T20:26:12.774677413Z" level=info msg="StartContainer for \"6a98a2ad3c8b15bb8dabcc7496c97ea9134e22855c31383488b2a00940dc2b84\" returns successfully" Feb 12 20:26:12.854858 kubelet[1425]: E0212 20:26:12.854832 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:12.871454 kubelet[1425]: I0212 20:26:12.871434 1425 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:26:12.871871 kubelet[1425]: I0212 20:26:12.871859 1425 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:26:13.067722 kubelet[1425]: I0212 20:26:13.067691 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-dh84x" podStartSLOduration=-9.223371976787113e+09 pod.CreationTimestamp="2024-02-12 20:25:13 +0000 UTC" firstStartedPulling="2024-02-12 20:25:51.306178484 +0000 UTC m=+51.269890029" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:13.067650351 +0000 UTC m=+73.031361896" watchObservedRunningTime="2024-02-12 20:26:13.067662644 +0000 UTC m=+73.031374199" Feb 12 20:26:13.568495 kubelet[1425]: E0212 20:26:13.568468 1425 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:26:13.856022 kubelet[1425]: E0212 20:26:13.855896 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:14.617761 kubelet[1425]: I0212 20:26:14.617640 1425 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:26:14.621992 systemd[1]: Created slice kubepods-besteffort-pod727aab4d_939c_42fc_9170_cd740b13ab58.slice. Feb 12 20:26:14.626000 audit[3210]: NETFILTER_CFG table=filter:98 family=2 entries=7 op=nft_register_rule pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:14.626000 audit[3210]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffca7d3dd0 a2=0 a3=7fffca7d3dbc items=0 ppid=1692 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:14.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:14.628000 audit[3210]: NETFILTER_CFG table=nat:99 family=2 entries=198 op=nft_register_rule pid=3210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:14.628000 audit[3210]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7fffca7d3dd0 a2=0 a3=7fffca7d3dbc items=0 ppid=1692 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:14.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:14.659000 audit[3236]: NETFILTER_CFG table=filter:100 family=2 entries=8 op=nft_register_rule pid=3236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:14.659000 audit[3236]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe5e4c92c0 a2=0 a3=7ffe5e4c92ac items=0 ppid=1692 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:14.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:14.662000 audit[3236]: NETFILTER_CFG table=nat:101 family=2 entries=198 op=nft_register_rule pid=3236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:14.662000 audit[3236]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffe5e4c92c0 a2=0 a3=7ffe5e4c92ac items=0 ppid=1692 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:14.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:14.771879 kubelet[1425]: I0212 20:26:14.771828 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/727aab4d-939c-42fc-9170-cd740b13ab58-calico-apiserver-certs\") pod \"calico-apiserver-6d596df75f-lhhx9\" (UID: \"727aab4d-939c-42fc-9170-cd740b13ab58\") " pod="calico-apiserver/calico-apiserver-6d596df75f-lhhx9" Feb 12 20:26:14.771879 kubelet[1425]: I0212 20:26:14.771878 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-txrtk\" (UniqueName: \"kubernetes.io/projected/727aab4d-939c-42fc-9170-cd740b13ab58-kube-api-access-txrtk\") pod \"calico-apiserver-6d596df75f-lhhx9\" (UID: \"727aab4d-939c-42fc-9170-cd740b13ab58\") " pod="calico-apiserver/calico-apiserver-6d596df75f-lhhx9" Feb 12 20:26:14.857080 kubelet[1425]: E0212 20:26:14.857026 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:14.872559 kubelet[1425]: E0212 20:26:14.872469 1425 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 20:26:14.872559 kubelet[1425]: E0212 20:26:14.872557 1425 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/727aab4d-939c-42fc-9170-cd740b13ab58-calico-apiserver-certs podName:727aab4d-939c-42fc-9170-cd740b13ab58 nodeName:}" failed. No retries permitted until 2024-02-12 20:26:15.372538078 +0000 UTC m=+75.336249623 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/727aab4d-939c-42fc-9170-cd740b13ab58-calico-apiserver-certs") pod "calico-apiserver-6d596df75f-lhhx9" (UID: "727aab4d-939c-42fc-9170-cd740b13ab58") : secret "calico-apiserver-certs" not found Feb 12 20:26:15.524802 env[1113]: time="2024-02-12T20:26:15.524725402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d596df75f-lhhx9,Uid:727aab4d-939c-42fc-9170-cd740b13ab58,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:26:15.661864 systemd-networkd[1013]: cali1f99163f107: Link UP Feb 12 20:26:15.663887 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:26:15.664077 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1f99163f107: link becomes ready Feb 12 20:26:15.664233 systemd-networkd[1013]: cali1f99163f107: Gained carrier Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.609 [INFO][3241] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0 calico-apiserver-6d596df75f- calico-apiserver 727aab4d-939c-42fc-9170-cd740b13ab58 1115 0 2024-02-12 20:26:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d596df75f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.86 calico-apiserver-6d596df75f-lhhx9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1f99163f107 [] []}} ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Namespace="calico-apiserver" Pod="calico-apiserver-6d596df75f-lhhx9" WorkloadEndpoint="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.609 [INFO][3241] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Namespace="calico-apiserver" Pod="calico-apiserver-6d596df75f-lhhx9" WorkloadEndpoint="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.629 [INFO][3254] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" HandleID="k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Workload="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.639 [INFO][3254] ipam_plugin.go 268: Auto assigning IP ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" HandleID="k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Workload="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051500), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.86", "pod":"calico-apiserver-6d596df75f-lhhx9", "timestamp":"2024-02-12 20:26:15.629443717 +0000 UTC"}, Hostname:"10.0.0.86", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.639 [INFO][3254] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.639 [INFO][3254] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.639 [INFO][3254] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.86' Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.641 [INFO][3254] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.644 [INFO][3254] ipam.go 372: Looking up existing affinities for host host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.647 [INFO][3254] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.648 [INFO][3254] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.650 [INFO][3254] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.651 [INFO][3254] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.652 [INFO][3254] ipam.go 1682: Creating new handle: k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6 Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.654 [INFO][3254] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.658 [INFO][3254] ipam.go 1216: Successfully claimed IPs: [192.168.21.196/26] block=192.168.21.192/26 handle="k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.658 [INFO][3254] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.196/26] handle="k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" host="10.0.0.86" Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.658 [INFO][3254] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:15.676814 env[1113]: 2024-02-12 20:26:15.658 [INFO][3254] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.196/26] IPv6=[] ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" HandleID="k8s-pod-network.39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Workload="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" Feb 12 20:26:15.677445 env[1113]: 2024-02-12 20:26:15.660 [INFO][3241] k8s.go 385: Populated endpoint ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Namespace="calico-apiserver" Pod="calico-apiserver-6d596df75f-lhhx9" WorkloadEndpoint="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0", GenerateName:"calico-apiserver-6d596df75f-", Namespace:"calico-apiserver", SelfLink:"", UID:"727aab4d-939c-42fc-9170-cd740b13ab58", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d596df75f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"", Pod:"calico-apiserver-6d596df75f-lhhx9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1f99163f107", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:15.677445 env[1113]: 2024-02-12 20:26:15.660 [INFO][3241] k8s.go 386: Calico CNI using IPs: [192.168.21.196/32] ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Namespace="calico-apiserver" Pod="calico-apiserver-6d596df75f-lhhx9" WorkloadEndpoint="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" Feb 12 20:26:15.677445 env[1113]: 2024-02-12 20:26:15.660 [INFO][3241] dataplane_linux.go 68: Setting the host side veth name to cali1f99163f107 ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Namespace="calico-apiserver" Pod="calico-apiserver-6d596df75f-lhhx9" WorkloadEndpoint="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" Feb 12 20:26:15.677445 env[1113]: 2024-02-12 20:26:15.664 [INFO][3241] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Namespace="calico-apiserver" Pod="calico-apiserver-6d596df75f-lhhx9" WorkloadEndpoint="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" Feb 12 20:26:15.677445 env[1113]: 2024-02-12 20:26:15.664 [INFO][3241] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Namespace="calico-apiserver" Pod="calico-apiserver-6d596df75f-lhhx9" WorkloadEndpoint="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0", GenerateName:"calico-apiserver-6d596df75f-", Namespace:"calico-apiserver", SelfLink:"", UID:"727aab4d-939c-42fc-9170-cd740b13ab58", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d596df75f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6", Pod:"calico-apiserver-6d596df75f-lhhx9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1f99163f107", MAC:"4a:20:e3:85:00:06", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:15.677445 env[1113]: 2024-02-12 20:26:15.675 [INFO][3241] k8s.go 491: Wrote updated endpoint to datastore ContainerID="39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6" Namespace="calico-apiserver" Pod="calico-apiserver-6d596df75f-lhhx9" WorkloadEndpoint="10.0.0.86-k8s-calico--apiserver--6d596df75f--lhhx9-eth0" Feb 12 20:26:15.690067 env[1113]: time="2024-02-12T20:26:15.689865278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:26:15.690067 env[1113]: time="2024-02-12T20:26:15.689912036Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:26:15.690067 env[1113]: time="2024-02-12T20:26:15.689926353Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:26:15.699181 kernel: kauditd_printk_skb: 123 callbacks suppressed Feb 12 20:26:15.699214 kernel: audit: type=1325 audit(1707769575.688:824): table=filter:102 family=2 entries=55 op=nft_register_chain pid=3289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:15.699250 kernel: audit: type=1300 audit(1707769575.688:824): arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffcb7afb9f0 a2=0 a3=7ffcb7afb9dc items=0 ppid=2237 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:15.699275 kernel: audit: type=1327 audit(1707769575.688:824): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:15.688000 audit[3289]: NETFILTER_CFG table=filter:102 family=2 entries=55 op=nft_register_chain pid=3289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:15.688000 audit[3289]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffcb7afb9f0 a2=0 a3=7ffcb7afb9dc items=0 ppid=2237 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:15.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:15.699504 env[1113]: time="2024-02-12T20:26:15.690347754Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6 pid=3290 runtime=io.containerd.runc.v2 Feb 12 20:26:15.705547 systemd[1]: Started cri-containerd-39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6.scope. Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.719233 kernel: audit: type=1400 audit(1707769575.714:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.719284 kernel: audit: type=1400 audit(1707769575.714:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.719308 kernel: audit: type=1400 audit(1707769575.714:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.721234 kernel: audit: type=1400 audit(1707769575.714:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.725275 kernel: audit: type=1400 audit(1707769575.714:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.725315 kernel: audit: type=1400 audit(1707769575.714:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.727795 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:26:15.729664 kernel: audit: type=1400 audit(1707769575.714:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit: BPF prog-id=111 op=LOAD Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3290 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:15.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656238333232633661386164366134656335333464363064373265 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3290 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:15.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656238333232633661386164366134656335333464363064373265 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.718000 audit: BPF prog-id=112 op=LOAD Feb 12 20:26:15.718000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a7740 items=0 ppid=3290 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:15.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656238333232633661386164366134656335333464363064373265 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.720000 audit: BPF prog-id=113 op=LOAD Feb 12 20:26:15.720000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a7788 items=0 ppid=3290 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:15.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656238333232633661386164366134656335333464363064373265 Feb 12 20:26:15.722000 audit: BPF prog-id=113 op=UNLOAD Feb 12 20:26:15.722000 audit: BPF prog-id=112 op=UNLOAD Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:15.722000 audit: BPF prog-id=114 op=LOAD Feb 12 20:26:15.722000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a7b98 items=0 ppid=3290 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:15.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656238333232633661386164366134656335333464363064373265 Feb 12 20:26:15.750208 env[1113]: time="2024-02-12T20:26:15.750162536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d596df75f-lhhx9,Uid:727aab4d-939c-42fc-9170-cd740b13ab58,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6\"" Feb 12 20:26:15.751399 env[1113]: time="2024-02-12T20:26:15.751369423Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:26:15.857466 kubelet[1425]: E0212 20:26:15.857338 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:16.862370 kubelet[1425]: E0212 20:26:16.860465 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:17.239589 kubelet[1425]: I0212 20:26:17.239560 1425 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:26:17.243741 systemd[1]: Created slice kubepods-besteffort-pod5a57363c_06be_4e0f_88f2_a7a742133c06.slice. Feb 12 20:26:17.492787 kubelet[1425]: I0212 20:26:17.492673 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-3d95a809-f238-48f0-89a6-041bdb4d2c5c\" (UniqueName: \"kubernetes.io/nfs/5a57363c-06be-4e0f-88f2-a7a742133c06-pvc-3d95a809-f238-48f0-89a6-041bdb4d2c5c\") pod \"test-pod-1\" (UID: \"5a57363c-06be-4e0f-88f2-a7a742133c06\") " pod="default/test-pod-1" Feb 12 20:26:17.492787 kubelet[1425]: I0212 20:26:17.492713 1425 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-54xxf\" (UniqueName: \"kubernetes.io/projected/5a57363c-06be-4e0f-88f2-a7a742133c06-kube-api-access-54xxf\") pod \"test-pod-1\" (UID: \"5a57363c-06be-4e0f-88f2-a7a742133c06\") " pod="default/test-pod-1" Feb 12 20:26:17.516912 systemd-networkd[1013]: cali1f99163f107: Gained IPv6LL Feb 12 20:26:17.701000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.701000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.704340 kernel: Failed to create system directory netfs Feb 12 20:26:17.704377 kernel: Failed to create system directory netfs Feb 12 20:26:17.704393 kernel: Failed to create system directory netfs Feb 12 20:26:17.701000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.701000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.705776 kernel: Failed to create system directory netfs Feb 12 20:26:17.701000 audit[3328]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5608169255e0 a1=153bc a2=560814f832b0 a3=5 items=0 ppid=522 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.701000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.713124 kernel: Failed to create system directory fscache Feb 12 20:26:17.713147 kernel: Failed to create system directory fscache Feb 12 20:26:17.713167 kernel: Failed to create system directory fscache Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.714109 kernel: Failed to create system directory fscache Feb 12 20:26:17.714138 kernel: Failed to create system directory fscache Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.715097 kernel: Failed to create system directory fscache Feb 12 20:26:17.715117 kernel: Failed to create system directory fscache Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.716086 kernel: Failed to create system directory fscache Feb 12 20:26:17.716105 kernel: Failed to create system directory fscache Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.717077 kernel: Failed to create system directory fscache Feb 12 20:26:17.717118 kernel: Failed to create system directory fscache Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.718076 kernel: Failed to create system directory fscache Feb 12 20:26:17.718109 kernel: Failed to create system directory fscache Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.709000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.719433 kernel: Failed to create system directory fscache Feb 12 20:26:17.720779 kernel: FS-Cache: Loaded Feb 12 20:26:17.709000 audit[3328]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560816b3a9c0 a1=4c0fc a2=560814f832b0 a3=5 items=0 ppid=522 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.709000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.829012 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.829038 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.829051 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.830033 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.830050 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.831039 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.831057 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.832051 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.832074 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.833095 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.833136 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.834342 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.834370 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.835905 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.835923 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.835936 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.836944 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.836975 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.837953 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.838004 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.838959 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.838989 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.839962 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.839990 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.840973 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.840992 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.841977 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.841995 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.843012 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.843029 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.844048 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.844077 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.845106 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.845149 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.846135 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.846157 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.847152 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.847184 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.848179 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.848218 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.849175 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.849205 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.850201 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.850219 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.851201 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.851229 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.852198 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.852223 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.853198 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.853220 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.854241 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.854275 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.861435 kubelet[1425]: E0212 20:26:17.861409 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.879282 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.879305 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.880796 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.880826 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.880844 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.881796 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.881819 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.882800 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.882819 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.883812 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.883831 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.884826 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.884846 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.885837 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.885857 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.886852 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.886870 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.887865 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.887897 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.888890 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.888935 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.889892 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.889918 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.890903 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.890933 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.891911 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.891943 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.893189 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.893223 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.894231 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.894430 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.895475 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.896063 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.896417 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.896609 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.896883 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.897446 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.897677 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.898291 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.899450 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.899623 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.899833 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.900128 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.901130 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.901159 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.902136 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.902172 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.903142 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.903202 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.904150 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.904175 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.905173 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.905196 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.906299 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.906548 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.907403 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.907573 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.908335 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.908416 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.909271 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.909436 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.910408 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.910668 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.911117 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.912143 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.912385 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.912403 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.913856 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.913876 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.913895 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.914860 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.914877 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.915857 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.915874 kernel: Failed to create system directory sunrpc Feb 12 20:26:17.818000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.924191 kernel: RPC: Registered named UNIX socket transport module. Feb 12 20:26:17.924229 kernel: RPC: Registered udp transport module. Feb 12 20:26:17.924254 kernel: RPC: Registered tcp transport module. Feb 12 20:26:17.925292 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 20:26:17.818000 audit[3328]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560816b86ad0 a1=1588c4 a2=560814f832b0 a3=5 items=6 ppid=522 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.818000 audit: CWD cwd="/" Feb 12 20:26:17.818000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:17.818000 audit: PATH item=1 name=(null) inode=24298 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:17.818000 audit: PATH item=2 name=(null) inode=24298 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:17.818000 audit: PATH item=3 name=(null) inode=24299 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:17.818000 audit: PATH item=4 name=(null) inode=24298 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:17.818000 audit: PATH item=5 name=(null) inode=24300 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:17.818000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.950030 kernel: Failed to create system directory nfs Feb 12 20:26:17.950090 kernel: Failed to create system directory nfs Feb 12 20:26:17.950109 kernel: Failed to create system directory nfs Feb 12 20:26:17.950126 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.951013 kernel: Failed to create system directory nfs Feb 12 20:26:17.951048 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.951931 kernel: Failed to create system directory nfs Feb 12 20:26:17.951955 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.952928 kernel: Failed to create system directory nfs Feb 12 20:26:17.952964 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.953860 kernel: Failed to create system directory nfs Feb 12 20:26:17.953885 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.954809 kernel: Failed to create system directory nfs Feb 12 20:26:17.954835 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.956233 kernel: Failed to create system directory nfs Feb 12 20:26:17.956257 kernel: Failed to create system directory nfs Feb 12 20:26:17.956274 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.957180 kernel: Failed to create system directory nfs Feb 12 20:26:17.957205 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.958146 kernel: Failed to create system directory nfs Feb 12 20:26:17.958198 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.959054 kernel: Failed to create system directory nfs Feb 12 20:26:17.959079 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.960040 kernel: Failed to create system directory nfs Feb 12 20:26:17.960061 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.960992 kernel: Failed to create system directory nfs Feb 12 20:26:17.961014 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.962191 kernel: Failed to create system directory nfs Feb 12 20:26:17.962224 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.963969 kernel: Failed to create system directory nfs Feb 12 20:26:17.963995 kernel: Failed to create system directory nfs Feb 12 20:26:17.964009 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.965176 kernel: Failed to create system directory nfs Feb 12 20:26:17.965198 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.965793 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.966953 kernel: Failed to create system directory nfs Feb 12 20:26:17.966979 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.968146 kernel: Failed to create system directory nfs Feb 12 20:26:17.968195 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.969336 kernel: Failed to create system directory nfs Feb 12 20:26:17.969356 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.971116 kernel: Failed to create system directory nfs Feb 12 20:26:17.971133 kernel: Failed to create system directory nfs Feb 12 20:26:17.971152 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.972293 kernel: Failed to create system directory nfs Feb 12 20:26:17.972311 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.974074 kernel: Failed to create system directory nfs Feb 12 20:26:17.974094 kernel: Failed to create system directory nfs Feb 12 20:26:17.974114 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.975263 kernel: Failed to create system directory nfs Feb 12 20:26:17.975284 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.977031 kernel: Failed to create system directory nfs Feb 12 20:26:17.977069 kernel: Failed to create system directory nfs Feb 12 20:26:17.977083 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.978265 kernel: Failed to create system directory nfs Feb 12 20:26:17.978307 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.980034 kernel: Failed to create system directory nfs Feb 12 20:26:17.980053 kernel: Failed to create system directory nfs Feb 12 20:26:17.980067 kernel: Failed to create system directory nfs Feb 12 20:26:17.942000 audit[3328]: AVC avc: denied { confidentiality } for pid=3328 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:17.942000 audit[3328]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560816d29680 a1=e29dc a2=560814f832b0 a3=5 items=0 ppid=522 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.942000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:26:17.998789 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.031181 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.031213 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.031229 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.031243 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.032120 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.032194 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.033070 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.033095 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.034017 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.034035 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.034960 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.034978 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.035905 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.035922 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.036847 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.036863 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.037796 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.037822 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.039214 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.039233 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.039252 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.040174 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.040200 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.041106 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.041123 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.042049 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.042071 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.042990 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.043012 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.043931 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.043953 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.044873 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.044889 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.046121 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.046173 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.047062 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.047094 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.047997 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.048031 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.048953 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.048979 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.049889 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.049908 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.050826 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.050844 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.052230 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.052256 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.052271 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.053160 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.053189 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.054131 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.054157 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.055068 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.055091 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.056017 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.056042 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.056963 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.056982 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.057911 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.057947 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.058847 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.058866 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.059782 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.059802 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.061182 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.061202 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.061216 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.062111 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.062130 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.063051 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.063077 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.064023 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.064043 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.065001 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.065020 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.065946 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.065973 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.066899 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.066917 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.067851 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.067905 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.068791 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.068818 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.070211 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.070263 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.070279 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.071192 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.071215 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.073067 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.073089 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.073104 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.074035 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.074054 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.020000 audit[3332]: AVC avc: denied { confidentiality } for pid=3332 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.075018 kernel: Failed to create system directory nfs4 Feb 12 20:26:18.215874 kernel: NFS: Registering the id_resolver key type Feb 12 20:26:18.215961 kernel: Key type id_resolver registered Feb 12 20:26:18.215983 kernel: Key type id_legacy registered Feb 12 20:26:18.020000 audit[3332]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f2bd0088010 a1=1d3cc4 a2=55d514c2d2b0 a3=5 items=0 ppid=522 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.020000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.228042 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.228084 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.228105 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.229087 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.229116 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.230115 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.230145 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.231141 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.231186 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.232175 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.232204 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.233205 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.233234 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.234305 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.234918 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.234960 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.236051 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.237153 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.237185 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.237202 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.239204 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.239231 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.240063 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.240856 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.224000 audit[3333]: AVC avc: denied { confidentiality } for pid=3333 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:26:18.242124 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.242393 kernel: Failed to create system directory rpcgss Feb 12 20:26:18.224000 audit[3333]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f31ec841010 a1=4f524 a2=55758ed452b0 a3=5 items=0 ppid=522 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.224000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 20:26:18.255510 nfsidmap[3343]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 12 20:26:18.262324 nfsidmap[3346]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 12 20:26:18.274000 audit[1177]: AVC avc: denied { watch_reads } for pid=1177 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:26:18.274000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:26:18.274000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:26:18.274000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:26:18.274000 audit[1177]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55edeb027cd0 a2=10 a3=4620817c1116adb8 items=0 ppid=1 pid=1177 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.274000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:26:18.274000 audit[1177]: AVC avc: denied { watch_reads } for pid=1177 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:26:18.274000 audit[1177]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55edeb027cd0 a2=10 a3=4620817c1116adb8 items=0 ppid=1 pid=1177 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.274000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:26:18.274000 audit[1177]: AVC avc: denied { watch_reads } for pid=1177 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2672 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:26:18.274000 audit[1177]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55edeb027cd0 a2=10 a3=4620817c1116adb8 items=0 ppid=1 pid=1177 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.274000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:26:18.445901 env[1113]: time="2024-02-12T20:26:18.445861034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5a57363c-06be-4e0f-88f2-a7a742133c06,Namespace:default,Attempt:0,}" Feb 12 20:26:18.554820 systemd-networkd[1013]: cali5ec59c6bf6e: Link UP Feb 12 20:26:18.557782 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:26:18.557832 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 20:26:18.556577 systemd-networkd[1013]: cali5ec59c6bf6e: Gained carrier Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.502 [INFO][3350] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.86-k8s-test--pod--1-eth0 default 5a57363c-06be-4e0f-88f2-a7a742133c06 1143 0 2024-02-12 20:25:59 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.86 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.86-k8s-test--pod--1-" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.502 [INFO][3350] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.86-k8s-test--pod--1-eth0" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.525 [INFO][3363] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" HandleID="k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Workload="10.0.0.86-k8s-test--pod--1-eth0" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.534 [INFO][3363] ipam_plugin.go 268: Auto assigning IP ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" HandleID="k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Workload="10.0.0.86-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051290), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.86", "pod":"test-pod-1", "timestamp":"2024-02-12 20:26:18.525967995 +0000 UTC"}, Hostname:"10.0.0.86", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.534 [INFO][3363] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.534 [INFO][3363] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.534 [INFO][3363] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.86' Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.535 [INFO][3363] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.538 [INFO][3363] ipam.go 372: Looking up existing affinities for host host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.541 [INFO][3363] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.542 [INFO][3363] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.544 [INFO][3363] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.544 [INFO][3363] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.545 [INFO][3363] ipam.go 1682: Creating new handle: k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.547 [INFO][3363] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.551 [INFO][3363] ipam.go 1216: Successfully claimed IPs: [192.168.21.197/26] block=192.168.21.192/26 handle="k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.551 [INFO][3363] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.197/26] handle="k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" host="10.0.0.86" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.551 [INFO][3363] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.551 [INFO][3363] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.197/26] IPv6=[] ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" HandleID="k8s-pod-network.039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Workload="10.0.0.86-k8s-test--pod--1-eth0" Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.553 [INFO][3350] k8s.go 385: Populated endpoint ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.86-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5a57363c-06be-4e0f-88f2-a7a742133c06", ResourceVersion:"1143", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:18.562091 env[1113]: 2024-02-12 20:26:18.553 [INFO][3350] k8s.go 386: Calico CNI using IPs: [192.168.21.197/32] ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.86-k8s-test--pod--1-eth0" Feb 12 20:26:18.562880 env[1113]: 2024-02-12 20:26:18.553 [INFO][3350] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.86-k8s-test--pod--1-eth0" Feb 12 20:26:18.562880 env[1113]: 2024-02-12 20:26:18.556 [INFO][3350] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.86-k8s-test--pod--1-eth0" Feb 12 20:26:18.562880 env[1113]: 2024-02-12 20:26:18.557 [INFO][3350] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.86-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.86-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5a57363c-06be-4e0f-88f2-a7a742133c06", ResourceVersion:"1143", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.86", ContainerID:"039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"62:8b:74:19:8b:65", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:18.562880 env[1113]: 2024-02-12 20:26:18.561 [INFO][3350] k8s.go 491: Wrote updated endpoint to datastore ContainerID="039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.86-k8s-test--pod--1-eth0" Feb 12 20:26:18.574185 env[1113]: time="2024-02-12T20:26:18.574103567Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:26:18.574185 env[1113]: time="2024-02-12T20:26:18.574139414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:26:18.574185 env[1113]: time="2024-02-12T20:26:18.574157658Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:26:18.573000 audit[3391]: NETFILTER_CFG table=filter:103 family=2 entries=48 op=nft_register_chain pid=3391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:18.573000 audit[3391]: SYSCALL arch=c000003e syscall=46 success=yes exit=23120 a0=3 a1=7fffbab33b50 a2=0 a3=7fffbab33b3c items=0 ppid=2237 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.573000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:18.574560 env[1113]: time="2024-02-12T20:26:18.574259319Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c pid=3395 runtime=io.containerd.runc.v2 Feb 12 20:26:18.586455 systemd[1]: Started cri-containerd-039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c.scope. Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit: BPF prog-id=115 op=LOAD Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3395 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396333356437373630303866643965613234313836356633386534 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3395 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396333356437373630303866643965613234313836356633386534 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit: BPF prog-id=116 op=LOAD Feb 12 20:26:18.596000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e1ce0 items=0 ppid=3395 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396333356437373630303866643965613234313836356633386534 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.596000 audit: BPF prog-id=117 op=LOAD Feb 12 20:26:18.596000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000e1d28 items=0 ppid=3395 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396333356437373630303866643965613234313836356633386534 Feb 12 20:26:18.597000 audit: BPF prog-id=117 op=UNLOAD Feb 12 20:26:18.597000 audit: BPF prog-id=116 op=UNLOAD Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { perfmon } for pid=3405 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit[3405]: AVC avc: denied { bpf } for pid=3405 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:18.597000 audit: BPF prog-id=118 op=LOAD Feb 12 20:26:18.597000 audit[3405]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000364138 items=0 ppid=3395 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:18.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033396333356437373630303866643965613234313836356633386534 Feb 12 20:26:18.598366 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:26:18.617114 env[1113]: time="2024-02-12T20:26:18.617072747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5a57363c-06be-4e0f-88f2-a7a742133c06,Namespace:default,Attempt:0,} returns sandbox id \"039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c\"" Feb 12 20:26:18.861948 kubelet[1425]: E0212 20:26:18.861835 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:19.861987 kubelet[1425]: E0212 20:26:19.861923 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:20.012939 systemd-networkd[1013]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 20:26:20.772475 kubelet[1425]: E0212 20:26:20.772423 1425 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:20.862738 kubelet[1425]: E0212 20:26:20.862685 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:21.097533 env[1113]: time="2024-02-12T20:26:21.097379980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:21.099361 env[1113]: time="2024-02-12T20:26:21.099326956Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:21.101152 env[1113]: time="2024-02-12T20:26:21.101129079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:21.103781 env[1113]: time="2024-02-12T20:26:21.103726406Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:21.104527 env[1113]: time="2024-02-12T20:26:21.104491662Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 20:26:21.105340 env[1113]: time="2024-02-12T20:26:21.105309087Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 20:26:21.106256 env[1113]: time="2024-02-12T20:26:21.106230687Z" level=info msg="CreateContainer within sandbox \"39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:26:21.117336 env[1113]: time="2024-02-12T20:26:21.117281125Z" level=info msg="CreateContainer within sandbox \"39eb8322c6a8ad6a4ec534d60d72e705424dff6737882a47dcccf7da954a3af6\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2c40b41f239c12aa2313c6a917f88fd16073145e22bc1b53bb25d9bbad633bb8\"" Feb 12 20:26:21.117795 env[1113]: time="2024-02-12T20:26:21.117762639Z" level=info msg="StartContainer for \"2c40b41f239c12aa2313c6a917f88fd16073145e22bc1b53bb25d9bbad633bb8\"" Feb 12 20:26:21.133761 systemd[1]: Started cri-containerd-2c40b41f239c12aa2313c6a917f88fd16073145e22bc1b53bb25d9bbad633bb8.scope. Feb 12 20:26:21.147794 kernel: kauditd_printk_skb: 464 callbacks suppressed Feb 12 20:26:21.147915 kernel: audit: type=1400 audit(1707769581.145:874): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.151792 kernel: audit: type=1400 audit(1707769581.145:875): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.151972 kernel: audit: type=1400 audit(1707769581.145:876): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.156151 kernel: audit: type=1400 audit(1707769581.145:877): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.156220 kernel: audit: type=1400 audit(1707769581.145:878): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.160391 kernel: audit: type=1400 audit(1707769581.145:879): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.160442 kernel: audit: type=1400 audit(1707769581.145:880): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.165133 kernel: audit: type=1400 audit(1707769581.145:881): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.167927 kernel: audit: type=1400 audit(1707769581.145:882): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.170516 kernel: audit: type=1400 audit(1707769581.146:883): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.146000 audit: BPF prog-id=119 op=LOAD Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3290 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343062343166323339633132616132333133633661393137663838 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3290 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343062343166323339633132616132333133633661393137663838 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.147000 audit: BPF prog-id=120 op=LOAD Feb 12 20:26:21.147000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021deb0 items=0 ppid=3290 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343062343166323339633132616132333133633661393137663838 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.148000 audit: BPF prog-id=121 op=LOAD Feb 12 20:26:21.148000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021def8 items=0 ppid=3290 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343062343166323339633132616132333133633661393137663838 Feb 12 20:26:21.150000 audit: BPF prog-id=121 op=UNLOAD Feb 12 20:26:21.150000 audit: BPF prog-id=120 op=UNLOAD Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.150000 audit: BPF prog-id=122 op=LOAD Feb 12 20:26:21.150000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003aa308 items=0 ppid=3290 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343062343166323339633132616132333133633661393137663838 Feb 12 20:26:21.218994 env[1113]: time="2024-02-12T20:26:21.218930350Z" level=info msg="StartContainer for \"2c40b41f239c12aa2313c6a917f88fd16073145e22bc1b53bb25d9bbad633bb8\" returns successfully" Feb 12 20:26:21.701458 env[1113]: time="2024-02-12T20:26:21.701395653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:21.703678 env[1113]: time="2024-02-12T20:26:21.703623526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:21.705486 env[1113]: time="2024-02-12T20:26:21.705459813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:21.707473 env[1113]: time="2024-02-12T20:26:21.707436223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:21.708177 env[1113]: time="2024-02-12T20:26:21.708136749Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 20:26:21.709610 env[1113]: time="2024-02-12T20:26:21.709573766Z" level=info msg="CreateContainer within sandbox \"039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 20:26:21.724840 env[1113]: time="2024-02-12T20:26:21.724784565Z" level=info msg="CreateContainer within sandbox \"039c35d776008fd9ea241865f38e40a8ee674d7b1ab45b965e8d038f76a86f8c\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"157cbdd30015a3f04fc3a9fd5fd94618c2d50eb29b8c26ddcabfd12ea1bc727a\"" Feb 12 20:26:21.725650 env[1113]: time="2024-02-12T20:26:21.725609584Z" level=info msg="StartContainer for \"157cbdd30015a3f04fc3a9fd5fd94618c2d50eb29b8c26ddcabfd12ea1bc727a\"" Feb 12 20:26:21.746677 systemd[1]: Started cri-containerd-157cbdd30015a3f04fc3a9fd5fd94618c2d50eb29b8c26ddcabfd12ea1bc727a.scope. Feb 12 20:26:21.754000 audit[3446]: AVC avc: denied { watch } for pid=3446 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_26_15.1513622369/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c599,c683 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c599,c683 tclass=file permissive=0 Feb 12 20:26:21.754000 audit[3446]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e6db20 a2=fc6 a3=0 items=0 ppid=3290 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c599,c683 key=(null) Feb 12 20:26:21.754000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit: BPF prog-id=123 op=LOAD Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00013dc48 a2=10 a3=1c items=0 ppid=3395 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135376362646433303031356133663034666333613966643566643934 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00013d6b0 a2=3c a3=8 items=0 ppid=3395 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135376362646433303031356133663034666333613966643566643934 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit: BPF prog-id=124 op=LOAD Feb 12 20:26:21.759000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013d9d8 a2=78 a3=c000183250 items=0 ppid=3395 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135376362646433303031356133663034666333613966643566643934 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.759000 audit: BPF prog-id=125 op=LOAD Feb 12 20:26:21.759000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00013d770 a2=78 a3=c000183298 items=0 ppid=3395 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135376362646433303031356133663034666333613966643566643934 Feb 12 20:26:21.760000 audit: BPF prog-id=125 op=UNLOAD Feb 12 20:26:21.760000 audit: BPF prog-id=124 op=UNLOAD Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:21.760000 audit: BPF prog-id=126 op=LOAD Feb 12 20:26:21.760000 audit[3474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00013dc30 a2=78 a3=c0001836a8 items=0 ppid=3395 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:21.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135376362646433303031356133663034666333613966643566643934 Feb 12 20:26:21.774009 env[1113]: time="2024-02-12T20:26:21.773962877Z" level=info msg="StartContainer for \"157cbdd30015a3f04fc3a9fd5fd94618c2d50eb29b8c26ddcabfd12ea1bc727a\" returns successfully" Feb 12 20:26:21.862864 kubelet[1425]: E0212 20:26:21.862814 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:22.087361 kubelet[1425]: I0212 20:26:22.087332 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.223372013767473e+09 pod.CreationTimestamp="2024-02-12 20:25:59 +0000 UTC" firstStartedPulling="2024-02-12 20:26:18.618096279 +0000 UTC m=+78.581807824" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:22.087018265 +0000 UTC m=+82.050729800" watchObservedRunningTime="2024-02-12 20:26:22.08730293 +0000 UTC m=+82.051014475" Feb 12 20:26:22.095411 kubelet[1425]: I0212 20:26:22.095395 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d596df75f-lhhx9" podStartSLOduration=-9.223372028759403e+09 pod.CreationTimestamp="2024-02-12 20:26:14 +0000 UTC" firstStartedPulling="2024-02-12 20:26:15.75116051 +0000 UTC m=+75.714872055" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:22.094372492 +0000 UTC m=+82.058084047" watchObservedRunningTime="2024-02-12 20:26:22.095372219 +0000 UTC m=+82.059083754" Feb 12 20:26:22.127000 audit[3549]: NETFILTER_CFG table=filter:104 family=2 entries=8 op=nft_register_rule pid=3549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.127000 audit[3549]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe72c42a10 a2=0 a3=7ffe72c429fc items=0 ppid=1692 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.130000 audit[3549]: NETFILTER_CFG table=nat:105 family=2 entries=198 op=nft_register_rule pid=3549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.130000 audit[3549]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffe72c42a10 a2=0 a3=7ffe72c429fc items=0 ppid=1692 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.130000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.159000 audit[3575]: NETFILTER_CFG table=filter:106 family=2 entries=8 op=nft_register_rule pid=3575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.159000 audit[3575]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdfa4c2eb0 a2=0 a3=7ffdfa4c2e9c items=0 ppid=1692 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.162000 audit[3575]: NETFILTER_CFG table=nat:107 family=2 entries=198 op=nft_register_rule pid=3575 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.162000 audit[3575]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffdfa4c2eb0 a2=0 a3=7ffdfa4c2e9c items=0 ppid=1692 pid=3575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.863714 kubelet[1425]: E0212 20:26:22.863666 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:23.864260 kubelet[1425]: E0212 20:26:23.864209 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:24.865359 kubelet[1425]: E0212 20:26:24.865301 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:25.865578 kubelet[1425]: E0212 20:26:25.865491 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:26.866486 kubelet[1425]: E0212 20:26:26.866426 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"