Feb 12 20:27:40.836055 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 20:27:40.836078 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:27:40.836089 kernel: BIOS-provided physical RAM map: Feb 12 20:27:40.836096 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 20:27:40.836104 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 20:27:40.836111 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 20:27:40.836120 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Feb 12 20:27:40.836128 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Feb 12 20:27:40.836137 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 20:27:40.836144 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 20:27:40.836152 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Feb 12 20:27:40.836159 kernel: NX (Execute Disable) protection: active Feb 12 20:27:40.836166 kernel: SMBIOS 2.8 present. Feb 12 20:27:40.836174 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Feb 12 20:27:40.836185 kernel: Hypervisor detected: KVM Feb 12 20:27:40.836193 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 20:27:40.836201 kernel: kvm-clock: cpu 0, msr 4afaa001, primary cpu clock Feb 12 20:27:40.836209 kernel: kvm-clock: using sched offset of 2185826005 cycles Feb 12 20:27:40.836218 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 20:27:40.836226 kernel: tsc: Detected 2794.748 MHz processor Feb 12 20:27:40.836235 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 20:27:40.836244 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 20:27:40.836252 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Feb 12 20:27:40.836262 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 20:27:40.836270 kernel: Using GB pages for direct mapping Feb 12 20:27:40.836278 kernel: ACPI: Early table checksum verification disabled Feb 12 20:27:40.836286 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Feb 12 20:27:40.836295 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:27:40.836303 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:27:40.836311 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:27:40.836320 kernel: ACPI: FACS 0x000000009CFE0000 000040 Feb 12 20:27:40.836328 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:27:40.836337 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:27:40.836346 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:27:40.836354 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Feb 12 20:27:40.836362 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Feb 12 20:27:40.836370 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Feb 12 20:27:40.836379 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Feb 12 20:27:40.836387 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Feb 12 20:27:40.836395 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Feb 12 20:27:40.836408 kernel: No NUMA configuration found Feb 12 20:27:40.836417 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Feb 12 20:27:40.836426 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Feb 12 20:27:40.836435 kernel: Zone ranges: Feb 12 20:27:40.836444 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 20:27:40.836453 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Feb 12 20:27:40.836463 kernel: Normal empty Feb 12 20:27:40.836472 kernel: Movable zone start for each node Feb 12 20:27:40.836480 kernel: Early memory node ranges Feb 12 20:27:40.836489 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 20:27:40.836498 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Feb 12 20:27:40.836507 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Feb 12 20:27:40.836516 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 20:27:40.836525 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 20:27:40.836534 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Feb 12 20:27:40.836544 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 20:27:40.836553 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 20:27:40.836562 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 20:27:40.836571 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 20:27:40.836580 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 20:27:40.836589 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 20:27:40.836598 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 20:27:40.836607 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 20:27:40.836615 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 20:27:40.836626 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 20:27:40.836635 kernel: TSC deadline timer available Feb 12 20:27:40.836643 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 12 20:27:40.836652 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 12 20:27:40.836661 kernel: kvm-guest: setup PV sched yield Feb 12 20:27:40.836670 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Feb 12 20:27:40.836679 kernel: Booting paravirtualized kernel on KVM Feb 12 20:27:40.836688 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 20:27:40.836697 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 12 20:27:40.836707 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 12 20:27:40.836716 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 12 20:27:40.836725 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 12 20:27:40.836733 kernel: kvm-guest: setup async PF for cpu 0 Feb 12 20:27:40.836742 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Feb 12 20:27:40.836750 kernel: kvm-guest: PV spinlocks enabled Feb 12 20:27:40.836759 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 20:27:40.836768 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Feb 12 20:27:40.836777 kernel: Policy zone: DMA32 Feb 12 20:27:40.836787 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:27:40.836798 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:27:40.836807 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 20:27:40.836816 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 20:27:40.836825 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:27:40.836834 kernel: Memory: 2438768K/2571756K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 132728K reserved, 0K cma-reserved) Feb 12 20:27:40.836843 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 20:27:40.836852 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 20:27:40.836861 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 20:27:40.836872 kernel: rcu: Hierarchical RCU implementation. Feb 12 20:27:40.836891 kernel: rcu: RCU event tracing is enabled. Feb 12 20:27:40.836900 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 20:27:40.836910 kernel: Rude variant of Tasks RCU enabled. Feb 12 20:27:40.836919 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:27:40.836928 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:27:40.836937 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 20:27:40.836945 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 12 20:27:40.836954 kernel: random: crng init done Feb 12 20:27:40.836965 kernel: Console: colour VGA+ 80x25 Feb 12 20:27:40.836973 kernel: printk: console [ttyS0] enabled Feb 12 20:27:40.836982 kernel: ACPI: Core revision 20210730 Feb 12 20:27:40.837001 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 20:27:40.837010 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 20:27:40.837019 kernel: x2apic enabled Feb 12 20:27:40.837028 kernel: Switched APIC routing to physical x2apic. Feb 12 20:27:40.837037 kernel: kvm-guest: setup PV IPIs Feb 12 20:27:40.837046 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 20:27:40.837056 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 12 20:27:40.837065 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Feb 12 20:27:40.837074 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 12 20:27:40.837083 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 12 20:27:40.837092 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 12 20:27:40.837101 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 20:27:40.837110 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 20:27:40.837119 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 20:27:40.837128 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 20:27:40.837144 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 12 20:27:40.837153 kernel: RETBleed: Mitigation: untrained return thunk Feb 12 20:27:40.837162 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 20:27:40.837173 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 20:27:40.837183 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 20:27:40.837192 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 20:27:40.837201 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 20:27:40.837211 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 20:27:40.837220 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 20:27:40.837231 kernel: Freeing SMP alternatives memory: 32K Feb 12 20:27:40.837240 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:27:40.837250 kernel: LSM: Security Framework initializing Feb 12 20:27:40.837259 kernel: SELinux: Initializing. Feb 12 20:27:40.837269 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 20:27:40.837278 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 20:27:40.837288 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 12 20:27:40.837299 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 12 20:27:40.837308 kernel: ... version: 0 Feb 12 20:27:40.837317 kernel: ... bit width: 48 Feb 12 20:27:40.837326 kernel: ... generic registers: 6 Feb 12 20:27:40.837336 kernel: ... value mask: 0000ffffffffffff Feb 12 20:27:40.837345 kernel: ... max period: 00007fffffffffff Feb 12 20:27:40.837354 kernel: ... fixed-purpose events: 0 Feb 12 20:27:40.837364 kernel: ... event mask: 000000000000003f Feb 12 20:27:40.837373 kernel: signal: max sigframe size: 1776 Feb 12 20:27:40.837384 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:27:40.837393 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:27:40.837402 kernel: x86: Booting SMP configuration: Feb 12 20:27:40.837411 kernel: .... node #0, CPUs: #1 Feb 12 20:27:40.837421 kernel: kvm-clock: cpu 1, msr 4afaa041, secondary cpu clock Feb 12 20:27:40.837430 kernel: kvm-guest: setup async PF for cpu 1 Feb 12 20:27:40.837439 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Feb 12 20:27:40.837448 kernel: #2 Feb 12 20:27:40.837458 kernel: kvm-clock: cpu 2, msr 4afaa081, secondary cpu clock Feb 12 20:27:40.837467 kernel: kvm-guest: setup async PF for cpu 2 Feb 12 20:27:40.837477 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Feb 12 20:27:40.837486 kernel: #3 Feb 12 20:27:40.837495 kernel: kvm-clock: cpu 3, msr 4afaa0c1, secondary cpu clock Feb 12 20:27:40.837504 kernel: kvm-guest: setup async PF for cpu 3 Feb 12 20:27:40.837513 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Feb 12 20:27:40.837523 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 20:27:40.837532 kernel: smpboot: Max logical packages: 1 Feb 12 20:27:40.837541 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Feb 12 20:27:40.837550 kernel: devtmpfs: initialized Feb 12 20:27:40.837561 kernel: x86/mm: Memory block size: 128MB Feb 12 20:27:40.837571 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:27:40.837580 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 20:27:40.837590 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:27:40.837599 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:27:40.837608 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:27:40.837617 kernel: audit: type=2000 audit(1707769660.478:1): state=initialized audit_enabled=0 res=1 Feb 12 20:27:40.837626 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:27:40.837636 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 20:27:40.837646 kernel: cpuidle: using governor menu Feb 12 20:27:40.837655 kernel: ACPI: bus type PCI registered Feb 12 20:27:40.837665 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:27:40.837674 kernel: dca service started, version 1.12.1 Feb 12 20:27:40.837683 kernel: PCI: Using configuration type 1 for base access Feb 12 20:27:40.837693 kernel: PCI: Using configuration type 1 for extended access Feb 12 20:27:40.837702 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 20:27:40.837711 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 20:27:40.837721 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:27:40.837731 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:27:40.837740 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:27:40.837750 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:27:40.837759 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:27:40.837769 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:27:40.837778 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:27:40.837788 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:27:40.837797 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 20:27:40.837806 kernel: ACPI: Interpreter enabled Feb 12 20:27:40.837817 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 20:27:40.837826 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 20:27:40.837836 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 20:27:40.837845 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 20:27:40.837854 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 20:27:40.838019 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:27:40.838035 kernel: acpiphp: Slot [3] registered Feb 12 20:27:40.838044 kernel: acpiphp: Slot [4] registered Feb 12 20:27:40.838056 kernel: acpiphp: Slot [5] registered Feb 12 20:27:40.838065 kernel: acpiphp: Slot [6] registered Feb 12 20:27:40.838074 kernel: acpiphp: Slot [7] registered Feb 12 20:27:40.838083 kernel: acpiphp: Slot [8] registered Feb 12 20:27:40.838092 kernel: acpiphp: Slot [9] registered Feb 12 20:27:40.838101 kernel: acpiphp: Slot [10] registered Feb 12 20:27:40.838110 kernel: acpiphp: Slot [11] registered Feb 12 20:27:40.838120 kernel: acpiphp: Slot [12] registered Feb 12 20:27:40.838129 kernel: acpiphp: Slot [13] registered Feb 12 20:27:40.838138 kernel: acpiphp: Slot [14] registered Feb 12 20:27:40.838148 kernel: acpiphp: Slot [15] registered Feb 12 20:27:40.838157 kernel: acpiphp: Slot [16] registered Feb 12 20:27:40.838167 kernel: acpiphp: Slot [17] registered Feb 12 20:27:40.838176 kernel: acpiphp: Slot [18] registered Feb 12 20:27:40.838185 kernel: acpiphp: Slot [19] registered Feb 12 20:27:40.838195 kernel: acpiphp: Slot [20] registered Feb 12 20:27:40.838204 kernel: acpiphp: Slot [21] registered Feb 12 20:27:40.838213 kernel: acpiphp: Slot [22] registered Feb 12 20:27:40.838222 kernel: acpiphp: Slot [23] registered Feb 12 20:27:40.838233 kernel: acpiphp: Slot [24] registered Feb 12 20:27:40.838243 kernel: acpiphp: Slot [25] registered Feb 12 20:27:40.838252 kernel: acpiphp: Slot [26] registered Feb 12 20:27:40.838261 kernel: acpiphp: Slot [27] registered Feb 12 20:27:40.838270 kernel: acpiphp: Slot [28] registered Feb 12 20:27:40.838279 kernel: acpiphp: Slot [29] registered Feb 12 20:27:40.838288 kernel: acpiphp: Slot [30] registered Feb 12 20:27:40.838297 kernel: acpiphp: Slot [31] registered Feb 12 20:27:40.838307 kernel: PCI host bridge to bus 0000:00 Feb 12 20:27:40.838406 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 20:27:40.838490 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 20:27:40.838571 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 20:27:40.838660 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 12 20:27:40.838740 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 20:27:40.838817 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 20:27:40.838945 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 20:27:40.839084 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 20:27:40.839188 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 20:27:40.839269 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 12 20:27:40.839346 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 20:27:40.839423 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 20:27:40.839547 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 20:27:40.839621 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 20:27:40.839701 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 20:27:40.839770 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 20:27:40.839862 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 20:27:40.839980 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 12 20:27:40.840064 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Feb 12 20:27:40.840131 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Feb 12 20:27:40.840200 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Feb 12 20:27:40.840266 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 20:27:40.840345 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 20:27:40.840414 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 20:27:40.840485 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Feb 12 20:27:40.840553 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Feb 12 20:27:40.840625 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 12 20:27:40.840697 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 20:27:40.840764 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Feb 12 20:27:40.840831 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Feb 12 20:27:40.840918 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 12 20:27:40.840987 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 12 20:27:40.841074 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Feb 12 20:27:40.841142 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Feb 12 20:27:40.841246 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Feb 12 20:27:40.841259 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 20:27:40.841266 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 20:27:40.841273 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 20:27:40.841280 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 20:27:40.841287 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 20:27:40.841294 kernel: iommu: Default domain type: Translated Feb 12 20:27:40.841301 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 20:27:40.841371 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 20:27:40.841443 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 20:27:40.841510 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 20:27:40.841519 kernel: vgaarb: loaded Feb 12 20:27:40.841526 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:27:40.841533 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:27:40.841539 kernel: PTP clock support registered Feb 12 20:27:40.841546 kernel: PCI: Using ACPI for IRQ routing Feb 12 20:27:40.841553 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 20:27:40.841562 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 20:27:40.841569 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Feb 12 20:27:40.841576 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 20:27:40.841583 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 20:27:40.841589 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 20:27:40.841596 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:27:40.841603 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:27:40.841610 kernel: pnp: PnP ACPI init Feb 12 20:27:40.841681 kernel: pnp 00:02: [dma 2] Feb 12 20:27:40.841692 kernel: pnp: PnP ACPI: found 6 devices Feb 12 20:27:40.841700 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 20:27:40.841707 kernel: NET: Registered PF_INET protocol family Feb 12 20:27:40.841714 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 20:27:40.841721 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 20:27:40.841728 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:27:40.841735 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 20:27:40.841742 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 20:27:40.841751 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 20:27:40.841758 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 20:27:40.841765 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 20:27:40.841772 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:27:40.841779 kernel: NET: Registered PF_XDP protocol family Feb 12 20:27:40.841841 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 20:27:40.841912 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 20:27:40.841977 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 20:27:40.842051 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 12 20:27:40.842115 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 20:27:40.842185 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 20:27:40.842253 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 20:27:40.842320 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 20:27:40.842329 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:27:40.842336 kernel: Initialise system trusted keyrings Feb 12 20:27:40.842343 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 20:27:40.842350 kernel: Key type asymmetric registered Feb 12 20:27:40.842359 kernel: Asymmetric key parser 'x509' registered Feb 12 20:27:40.842366 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:27:40.842373 kernel: io scheduler mq-deadline registered Feb 12 20:27:40.842380 kernel: io scheduler kyber registered Feb 12 20:27:40.842387 kernel: io scheduler bfq registered Feb 12 20:27:40.842394 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 20:27:40.842401 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 20:27:40.842408 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 20:27:40.842415 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 20:27:40.842424 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:27:40.842431 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 20:27:40.842438 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 20:27:40.842445 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 20:27:40.842452 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 20:27:40.842533 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 12 20:27:40.842544 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 20:27:40.842606 kernel: rtc_cmos 00:05: registered as rtc0 Feb 12 20:27:40.842671 kernel: rtc_cmos 00:05: setting system clock to 2024-02-12T20:27:40 UTC (1707769660) Feb 12 20:27:40.842734 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 12 20:27:40.842743 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:27:40.842750 kernel: Segment Routing with IPv6 Feb 12 20:27:40.842757 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:27:40.842765 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:27:40.842771 kernel: Key type dns_resolver registered Feb 12 20:27:40.842778 kernel: IPI shorthand broadcast: enabled Feb 12 20:27:40.842785 kernel: sched_clock: Marking stable (382061075, 71584854)->(489310878, -35664949) Feb 12 20:27:40.842795 kernel: registered taskstats version 1 Feb 12 20:27:40.842802 kernel: Loading compiled-in X.509 certificates Feb 12 20:27:40.842809 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 20:27:40.842815 kernel: Key type .fscrypt registered Feb 12 20:27:40.842822 kernel: Key type fscrypt-provisioning registered Feb 12 20:27:40.842829 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 20:27:40.842837 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:27:40.842843 kernel: ima: No architecture policies found Feb 12 20:27:40.842851 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 20:27:40.842858 kernel: Write protecting the kernel read-only data: 28672k Feb 12 20:27:40.842865 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 20:27:40.842872 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 20:27:40.842888 kernel: Run /init as init process Feb 12 20:27:40.842895 kernel: with arguments: Feb 12 20:27:40.842902 kernel: /init Feb 12 20:27:40.842909 kernel: with environment: Feb 12 20:27:40.842924 kernel: HOME=/ Feb 12 20:27:40.842932 kernel: TERM=linux Feb 12 20:27:40.842940 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:27:40.842949 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:27:40.842959 systemd[1]: Detected virtualization kvm. Feb 12 20:27:40.842967 systemd[1]: Detected architecture x86-64. Feb 12 20:27:40.842975 systemd[1]: Running in initrd. Feb 12 20:27:40.842984 systemd[1]: No hostname configured, using default hostname. Feb 12 20:27:40.843030 systemd[1]: Hostname set to . Feb 12 20:27:40.843040 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:27:40.843048 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:27:40.843055 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:27:40.843063 systemd[1]: Reached target cryptsetup.target. Feb 12 20:27:40.843070 systemd[1]: Reached target paths.target. Feb 12 20:27:40.843077 systemd[1]: Reached target slices.target. Feb 12 20:27:40.843085 systemd[1]: Reached target swap.target. Feb 12 20:27:40.843092 systemd[1]: Reached target timers.target. Feb 12 20:27:40.843101 systemd[1]: Listening on iscsid.socket. Feb 12 20:27:40.843109 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:27:40.843116 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:27:40.843124 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:27:40.843131 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:27:40.843139 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:27:40.843146 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:27:40.843155 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:27:40.843163 systemd[1]: Reached target sockets.target. Feb 12 20:27:40.843171 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:27:40.843179 systemd[1]: Finished network-cleanup.service. Feb 12 20:27:40.843186 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:27:40.843194 systemd[1]: Starting systemd-journald.service... Feb 12 20:27:40.843202 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:27:40.843210 systemd[1]: Starting systemd-resolved.service... Feb 12 20:27:40.843218 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:27:40.843226 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:27:40.843233 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:27:40.843241 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:27:40.843248 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:27:40.843260 systemd-journald[197]: Journal started Feb 12 20:27:40.843299 systemd-journald[197]: Runtime Journal (/run/log/journal/8bde0710549b429f9c8233f8e4f7740e) is 6.0M, max 48.5M, 42.5M free. Feb 12 20:27:40.832927 systemd-modules-load[198]: Inserted module 'overlay' Feb 12 20:27:40.879008 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:27:40.879045 kernel: Bridge firewalling registered Feb 12 20:27:40.879061 kernel: audit: type=1130 audit(1707769660.865:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.879075 systemd[1]: Started systemd-journald.service. Feb 12 20:27:40.879096 kernel: audit: type=1130 audit(1707769660.868:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.879112 kernel: audit: type=1130 audit(1707769660.868:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.879122 kernel: audit: type=1130 audit(1707769660.874:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.887115 kernel: SCSI subsystem initialized Feb 12 20:27:40.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.858930 systemd-modules-load[198]: Inserted module 'br_netfilter' Feb 12 20:27:40.860113 systemd-resolved[199]: Positive Trust Anchors: Feb 12 20:27:40.860128 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:27:40.860167 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:27:40.862949 systemd-resolved[199]: Defaulting to hostname 'linux'. Feb 12 20:27:40.869026 systemd[1]: Started systemd-resolved.service. Feb 12 20:27:40.869403 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:27:40.875123 systemd[1]: Reached target nss-lookup.target. Feb 12 20:27:40.879136 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:27:40.898604 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:27:40.900856 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:27:40.900888 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:27:40.900906 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:27:40.901641 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:27:40.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.904831 systemd-modules-load[198]: Inserted module 'dm_multipath' Feb 12 20:27:40.905491 kernel: audit: type=1130 audit(1707769660.899:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.905537 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:27:40.909562 kernel: audit: type=1130 audit(1707769660.904:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.906554 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:27:40.913662 dracut-cmdline[216]: dracut-dracut-053 Feb 12 20:27:40.913916 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:27:40.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.917579 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:27:40.920684 kernel: audit: type=1130 audit(1707769660.913:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:40.968026 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:27:40.979027 kernel: iscsi: registered transport (tcp) Feb 12 20:27:40.997118 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:27:40.997169 kernel: QLogic iSCSI HBA Driver Feb 12 20:27:41.021346 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:27:41.025564 kernel: audit: type=1130 audit(1707769661.021:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:41.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:41.022966 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:27:41.069021 kernel: raid6: avx2x4 gen() 20068 MB/s Feb 12 20:27:41.086024 kernel: raid6: avx2x4 xor() 5784 MB/s Feb 12 20:27:41.103026 kernel: raid6: avx2x2 gen() 19995 MB/s Feb 12 20:27:41.120019 kernel: raid6: avx2x2 xor() 13252 MB/s Feb 12 20:27:41.137013 kernel: raid6: avx2x1 gen() 25659 MB/s Feb 12 20:27:41.154019 kernel: raid6: avx2x1 xor() 14444 MB/s Feb 12 20:27:41.171007 kernel: raid6: sse2x4 gen() 14271 MB/s Feb 12 20:27:41.188014 kernel: raid6: sse2x4 xor() 6547 MB/s Feb 12 20:27:41.205021 kernel: raid6: sse2x2 gen() 15612 MB/s Feb 12 20:27:41.222014 kernel: raid6: sse2x2 xor() 9856 MB/s Feb 12 20:27:41.239013 kernel: raid6: sse2x1 gen() 11859 MB/s Feb 12 20:27:41.256046 kernel: raid6: sse2x1 xor() 7606 MB/s Feb 12 20:27:41.256066 kernel: raid6: using algorithm avx2x1 gen() 25659 MB/s Feb 12 20:27:41.256075 kernel: raid6: .... xor() 14444 MB/s, rmw enabled Feb 12 20:27:41.257042 kernel: raid6: using avx2x2 recovery algorithm Feb 12 20:27:41.268008 kernel: xor: automatically using best checksumming function avx Feb 12 20:27:41.355021 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 20:27:41.362940 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:27:41.366145 kernel: audit: type=1130 audit(1707769661.362:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:41.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:41.365000 audit: BPF prog-id=7 op=LOAD Feb 12 20:27:41.365000 audit: BPF prog-id=8 op=LOAD Feb 12 20:27:41.366440 systemd[1]: Starting systemd-udevd.service... Feb 12 20:27:41.377458 systemd-udevd[398]: Using default interface naming scheme 'v252'. Feb 12 20:27:41.380857 systemd[1]: Started systemd-udevd.service. Feb 12 20:27:41.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:41.381794 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:27:41.391227 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Feb 12 20:27:41.414230 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:27:41.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:41.416091 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:27:41.450556 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:27:41.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:41.485009 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 20:27:41.485053 kernel: libata version 3.00 loaded. Feb 12 20:27:41.489282 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 20:27:41.495484 kernel: scsi host0: ata_piix Feb 12 20:27:41.506011 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 20:27:41.507199 kernel: AES CTR mode by8 optimization enabled Feb 12 20:27:41.507227 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 20:27:41.511551 kernel: scsi host1: ata_piix Feb 12 20:27:41.511683 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 12 20:27:41.511693 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 12 20:27:41.514008 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:27:41.514032 kernel: GPT:9289727 != 19775487 Feb 12 20:27:41.514045 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:27:41.514058 kernel: GPT:9289727 != 19775487 Feb 12 20:27:41.514073 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:27:41.514084 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:27:41.664030 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 12 20:27:41.664091 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 12 20:27:41.680022 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (456) Feb 12 20:27:41.686144 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:27:41.689649 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:27:41.694891 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:27:41.695237 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:27:41.700205 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:27:41.702195 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 12 20:27:41.702366 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 20:27:41.702228 systemd[1]: Starting disk-uuid.service... Feb 12 20:27:41.711293 disk-uuid[532]: Primary Header is updated. Feb 12 20:27:41.711293 disk-uuid[532]: Secondary Entries is updated. Feb 12 20:27:41.711293 disk-uuid[532]: Secondary Header is updated. Feb 12 20:27:41.714012 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:27:41.722025 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 12 20:27:42.756019 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:27:42.756134 disk-uuid[533]: The operation has completed successfully. Feb 12 20:27:42.776866 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:27:42.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.776946 systemd[1]: Finished disk-uuid.service. Feb 12 20:27:42.783639 systemd[1]: Starting verity-setup.service... Feb 12 20:27:42.800044 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 12 20:27:42.818290 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:27:42.819979 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:27:42.822220 systemd[1]: Finished verity-setup.service. Feb 12 20:27:42.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.880016 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:27:42.880047 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:27:42.880784 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:27:42.881500 systemd[1]: Starting ignition-setup.service... Feb 12 20:27:42.883470 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:27:42.889593 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:27:42.889656 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:27:42.889670 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:27:42.897222 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:27:42.905194 systemd[1]: Finished ignition-setup.service. Feb 12 20:27:42.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.906284 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:27:42.940448 ignition[635]: Ignition 2.14.0 Feb 12 20:27:42.940458 ignition[635]: Stage: fetch-offline Feb 12 20:27:42.940509 ignition[635]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:27:42.940520 ignition[635]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:27:42.940617 ignition[635]: parsed url from cmdline: "" Feb 12 20:27:42.940620 ignition[635]: no config URL provided Feb 12 20:27:42.940624 ignition[635]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:27:42.940631 ignition[635]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:27:42.940654 ignition[635]: op(1): [started] loading QEMU firmware config module Feb 12 20:27:42.940663 ignition[635]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 20:27:42.947123 ignition[635]: op(1): [finished] loading QEMU firmware config module Feb 12 20:27:42.950984 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:27:42.953531 systemd[1]: Starting systemd-networkd.service... Feb 12 20:27:42.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.952000 audit: BPF prog-id=9 op=LOAD Feb 12 20:27:42.959203 ignition[635]: parsing config with SHA512: bdae7448e672d1684f8af853005e57a3a3e1f746a9c2cd2f90f7afeeb6a710bd1f29e789b68329a10b7714e57edb556ba97b22b8c7757567c4b7c613103847d8 Feb 12 20:27:42.975377 unknown[635]: fetched base config from "system" Feb 12 20:27:42.975927 ignition[635]: fetch-offline: fetch-offline passed Feb 12 20:27:42.975390 unknown[635]: fetched user config from "qemu" Feb 12 20:27:42.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.976007 ignition[635]: Ignition finished successfully Feb 12 20:27:42.977078 systemd-networkd[715]: lo: Link UP Feb 12 20:27:42.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.977082 systemd-networkd[715]: lo: Gained carrier Feb 12 20:27:42.977438 systemd-networkd[715]: Enumeration completed Feb 12 20:27:42.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.977587 systemd[1]: Started systemd-networkd.service. Feb 12 20:27:42.977675 systemd-networkd[715]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:27:42.978562 systemd-networkd[715]: eth0: Link UP Feb 12 20:27:42.978565 systemd-networkd[715]: eth0: Gained carrier Feb 12 20:27:42.990963 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:27:42.990963 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:27:42.990963 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:27:42.990963 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:27:42.990963 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:27:42.990963 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:27:42.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.978855 systemd[1]: Reached target network.target. Feb 12 20:27:42.992672 ignition[720]: Ignition 2.14.0 Feb 12 20:27:42.980714 systemd[1]: Starting iscsiuio.service... Feb 12 20:27:42.992678 ignition[720]: Stage: kargs Feb 12 20:27:42.982539 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:27:42.992755 ignition[720]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:27:42.983500 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 20:27:42.992762 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:27:43.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:42.984457 systemd[1]: Starting ignition-kargs.service... Feb 12 20:27:42.993529 ignition[720]: kargs: kargs passed Feb 12 20:27:42.985471 systemd[1]: Started iscsiuio.service. Feb 12 20:27:42.993559 ignition[720]: Ignition finished successfully Feb 12 20:27:42.986431 systemd[1]: Starting iscsid.service... Feb 12 20:27:43.006361 ignition[733]: Ignition 2.14.0 Feb 12 20:27:42.992197 systemd[1]: Started iscsid.service. Feb 12 20:27:43.006366 ignition[733]: Stage: disks Feb 12 20:27:42.993055 systemd-networkd[715]: eth0: DHCPv4 address 10.0.0.120/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 20:27:43.006453 ignition[733]: no configs at "/usr/lib/ignition/base.d" Feb 12 20:27:42.993816 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:27:43.006460 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:27:42.994725 systemd[1]: Finished ignition-kargs.service. Feb 12 20:27:43.007485 ignition[733]: disks: disks passed Feb 12 20:27:42.999918 systemd[1]: Starting ignition-disks.service... Feb 12 20:27:43.007518 ignition[733]: Ignition finished successfully Feb 12 20:27:43.008349 systemd[1]: Finished ignition-disks.service. Feb 12 20:27:43.009271 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:27:43.010375 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:27:43.010619 systemd[1]: Reached target local-fs.target. Feb 12 20:27:43.010880 systemd[1]: Reached target sysinit.target. Feb 12 20:27:43.013881 systemd[1]: Reached target basic.target. Feb 12 20:27:43.027560 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:27:43.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:43.027797 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:27:43.029170 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:27:43.029418 systemd[1]: Reached target remote-fs.target. Feb 12 20:27:43.031672 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:27:43.042117 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:27:43.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:43.043394 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:27:43.055615 systemd-fsck[749]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 20:27:43.060414 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:27:43.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:43.061176 systemd[1]: Mounting sysroot.mount... Feb 12 20:27:43.066023 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:27:43.066423 systemd[1]: Mounted sysroot.mount. Feb 12 20:27:43.066815 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:27:43.068708 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:27:43.069165 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:27:43.069198 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:27:43.069219 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:27:43.076712 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:27:43.077716 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:27:43.082051 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:27:43.084959 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:27:43.088419 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:27:43.091687 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:27:43.119851 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:27:43.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:43.120774 systemd[1]: Starting ignition-mount.service... Feb 12 20:27:43.122181 systemd[1]: Starting sysroot-boot.service... Feb 12 20:27:43.125651 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 20:27:43.131989 ignition[801]: INFO : Ignition 2.14.0 Feb 12 20:27:43.131989 ignition[801]: INFO : Stage: mount Feb 12 20:27:43.133307 ignition[801]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:27:43.133307 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:27:43.133307 ignition[801]: INFO : mount: mount passed Feb 12 20:27:43.133307 ignition[801]: INFO : Ignition finished successfully Feb 12 20:27:43.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:43.133469 systemd[1]: Finished ignition-mount.service. Feb 12 20:27:43.146973 systemd[1]: Finished sysroot-boot.service. Feb 12 20:27:43.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:43.287068 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.120 Feb 12 20:27:43.287088 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux5'. Feb 12 20:27:43.829969 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:27:43.839014 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (810) Feb 12 20:27:43.841475 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:27:43.841517 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:27:43.841526 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:27:43.844643 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:27:43.846088 systemd[1]: Starting ignition-files.service... Feb 12 20:27:43.861062 ignition[830]: INFO : Ignition 2.14.0 Feb 12 20:27:43.861062 ignition[830]: INFO : Stage: files Feb 12 20:27:43.862607 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:27:43.862607 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:27:43.865234 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:27:43.866718 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:27:43.866718 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:27:43.870234 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:27:43.871470 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:27:43.873025 unknown[830]: wrote ssh authorized keys file for user: core Feb 12 20:27:43.873933 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:27:43.875183 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 20:27:43.875183 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 20:27:44.261445 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 20:27:44.286130 systemd-networkd[715]: eth0: Gained IPv6LL Feb 12 20:27:44.450937 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 20:27:44.450937 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 20:27:44.454440 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 20:27:44.454440 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 20:27:44.764544 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 20:27:44.894137 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 20:27:44.896592 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 20:27:44.896592 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:27:44.896592 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 12 20:27:44.962065 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 20:27:45.135169 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 12 20:27:45.135169 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:27:45.138258 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:27:45.138258 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 12 20:27:45.181302 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 20:27:45.577678 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 12 20:27:45.577678 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:27:45.580931 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:27:45.580931 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:27:45.580931 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:27:45.580931 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:27:45.650109 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:27:45.651885 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Feb 12 20:27:45.651885 ignition[830]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 20:27:45.667231 ignition[830]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 20:27:45.667231 ignition[830]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Feb 12 20:27:45.667231 ignition[830]: INFO : files: op(10): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:27:45.667231 ignition[830]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:27:45.667231 ignition[830]: INFO : files: op(11): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:27:45.667231 ignition[830]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:27:45.667231 ignition[830]: INFO : files: op(12): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 20:27:45.667231 ignition[830]: INFO : files: op(12): op(13): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 20:27:45.689975 ignition[830]: INFO : files: op(12): op(13): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 20:27:45.691299 ignition[830]: INFO : files: op(12): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 20:27:45.691299 ignition[830]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:27:45.691299 ignition[830]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:27:45.691299 ignition[830]: INFO : files: files passed Feb 12 20:27:45.691299 ignition[830]: INFO : Ignition finished successfully Feb 12 20:27:45.697484 systemd[1]: Finished ignition-files.service. Feb 12 20:27:45.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.698739 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:27:45.703703 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 20:27:45.703728 kernel: audit: type=1130 audit(1707769665.696:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.702861 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:27:45.703603 systemd[1]: Starting ignition-quench.service... Feb 12 20:27:45.706174 initrd-setup-root-after-ignition[853]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 20:27:45.712303 kernel: audit: type=1130 audit(1707769665.705:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.712347 kernel: audit: type=1131 audit(1707769665.705:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.705879 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:27:45.705940 systemd[1]: Finished ignition-quench.service. Feb 12 20:27:45.715017 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:27:45.716603 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:27:45.720350 kernel: audit: type=1130 audit(1707769665.715:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.716984 systemd[1]: Reached target ignition-complete.target. Feb 12 20:27:45.722385 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:27:45.732908 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:27:45.733007 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:27:45.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.735141 systemd[1]: Reached target initrd-fs.target. Feb 12 20:27:45.740838 kernel: audit: type=1130 audit(1707769665.734:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.740866 kernel: audit: type=1131 audit(1707769665.734:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.740781 systemd[1]: Reached target initrd.target. Feb 12 20:27:45.742018 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:27:45.743678 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:27:45.752528 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:27:45.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.754526 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:27:45.757243 kernel: audit: type=1130 audit(1707769665.752:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.762842 systemd[1]: Stopped target network.target. Feb 12 20:27:45.764194 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:27:45.765592 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:27:45.767102 systemd[1]: Stopped target timers.target. Feb 12 20:27:45.768386 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:27:45.769235 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:27:45.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.770683 systemd[1]: Stopped target initrd.target. Feb 12 20:27:45.773886 kernel: audit: type=1131 audit(1707769665.770:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.773957 systemd[1]: Stopped target basic.target. Feb 12 20:27:45.775227 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:27:45.776721 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:27:45.778192 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:27:45.779684 systemd[1]: Stopped target remote-fs.target. Feb 12 20:27:45.781035 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:27:45.782460 systemd[1]: Stopped target sysinit.target. Feb 12 20:27:45.783776 systemd[1]: Stopped target local-fs.target. Feb 12 20:27:45.785085 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:27:45.786730 systemd[1]: Stopped target swap.target. Feb 12 20:27:45.788037 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:27:45.788882 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:27:45.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.790472 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:27:45.793860 kernel: audit: type=1131 audit(1707769665.789:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.793861 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:27:45.794693 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:27:45.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.796103 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:27:45.796211 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:27:45.799012 kernel: audit: type=1131 audit(1707769665.796:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.800487 systemd[1]: Stopped target paths.target. Feb 12 20:27:45.801732 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:27:45.806030 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:27:45.807567 systemd[1]: Stopped target slices.target. Feb 12 20:27:45.808853 systemd[1]: Stopped target sockets.target. Feb 12 20:27:45.810136 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:27:45.810864 systemd[1]: Closed iscsid.socket. Feb 12 20:27:45.812044 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:27:45.812805 systemd[1]: Closed iscsiuio.socket. Feb 12 20:27:45.814025 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:27:45.815015 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:27:45.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.816669 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:27:45.817493 systemd[1]: Stopped ignition-files.service. Feb 12 20:27:45.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.819727 systemd[1]: Stopping ignition-mount.service... Feb 12 20:27:45.821683 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:27:45.823101 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:27:45.824591 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:27:45.825826 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:27:45.826865 ignition[870]: INFO : Ignition 2.14.0 Feb 12 20:27:45.826865 ignition[870]: INFO : Stage: umount Feb 12 20:27:45.826865 ignition[870]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 20:27:45.826865 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 20:27:45.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.826905 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:27:45.832505 ignition[870]: INFO : umount: umount passed Feb 12 20:27:45.832505 ignition[870]: INFO : Ignition finished successfully Feb 12 20:27:45.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.828057 systemd-networkd[715]: eth0: DHCPv6 lease lost Feb 12 20:27:45.829044 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:27:45.830011 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:27:45.838906 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:27:45.840472 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:27:45.841307 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:27:45.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.843372 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:27:45.843470 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:27:45.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.846208 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:27:45.847045 systemd[1]: Stopped ignition-mount.service. Feb 12 20:27:45.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.848676 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:27:45.849463 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:27:45.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.850000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:27:45.850000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:27:45.851127 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:27:45.851967 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:27:45.853233 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:27:45.853275 systemd[1]: Stopped ignition-disks.service. Feb 12 20:27:45.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.855293 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:27:45.855332 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:27:45.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.857278 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:27:45.857317 systemd[1]: Stopped ignition-setup.service. Feb 12 20:27:45.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.859292 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:27:45.859330 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:27:45.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.862126 systemd[1]: Stopping network-cleanup.service... Feb 12 20:27:45.863555 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:27:45.863602 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:27:45.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.865856 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:27:45.865901 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:27:45.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.868144 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:27:45.868186 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:27:45.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.870454 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:27:45.872763 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:27:45.874343 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:27:45.875212 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:27:45.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.878672 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:27:45.879447 systemd[1]: Stopped network-cleanup.service. Feb 12 20:27:45.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.880793 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:27:45.881562 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:27:45.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.883084 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:27:45.883115 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:27:45.884978 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:27:45.885014 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:27:45.886844 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:27:45.886878 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:27:45.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.888641 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:27:45.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.888668 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:27:45.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.889979 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:27:45.890019 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:27:45.892894 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:27:45.894157 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 20:27:45.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.894191 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 20:27:45.895711 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:27:45.895758 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:27:45.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.898021 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:27:45.898563 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:27:45.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.901259 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 20:27:45.902622 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:27:45.903430 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:27:45.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:45.904799 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:27:45.906615 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:27:45.920152 systemd[1]: Switching root. Feb 12 20:27:45.938475 systemd-journald[197]: Journal stopped Feb 12 20:27:48.498868 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). Feb 12 20:27:48.498919 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:27:48.498931 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:27:48.498941 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:27:48.498953 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:27:48.498962 kernel: SELinux: policy capability open_perms=1 Feb 12 20:27:48.498972 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:27:48.498981 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:27:48.499002 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:27:48.499012 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:27:48.499021 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:27:48.499030 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:27:48.499039 systemd[1]: Successfully loaded SELinux policy in 36.198ms. Feb 12 20:27:48.499061 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.657ms. Feb 12 20:27:48.499074 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:27:48.499084 systemd[1]: Detected virtualization kvm. Feb 12 20:27:48.499094 systemd[1]: Detected architecture x86-64. Feb 12 20:27:48.499109 systemd[1]: Detected first boot. Feb 12 20:27:48.499119 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:27:48.499129 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:27:48.499139 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:27:48.499151 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:27:48.499164 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:27:48.499708 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:27:48.499722 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:27:48.499736 systemd[1]: Stopped iscsiuio.service. Feb 12 20:27:48.499745 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:27:48.499756 systemd[1]: Stopped iscsid.service. Feb 12 20:27:48.499766 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:27:48.499776 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:27:48.499786 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:27:48.499796 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:27:48.499806 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:27:48.499816 systemd[1]: Created slice system-getty.slice. Feb 12 20:27:48.499828 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:27:48.499839 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:27:48.499848 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:27:48.499859 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:27:48.499868 systemd[1]: Created slice user.slice. Feb 12 20:27:48.499878 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:27:48.499889 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:27:48.499898 systemd[1]: Set up automount boot.automount. Feb 12 20:27:48.499909 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:27:48.499919 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:27:48.499929 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:27:48.499939 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:27:48.499949 systemd[1]: Reached target integritysetup.target. Feb 12 20:27:48.499959 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:27:48.499969 systemd[1]: Reached target remote-fs.target. Feb 12 20:27:48.499979 systemd[1]: Reached target slices.target. Feb 12 20:27:48.499988 systemd[1]: Reached target swap.target. Feb 12 20:27:48.500011 systemd[1]: Reached target torcx.target. Feb 12 20:27:48.500021 systemd[1]: Reached target veritysetup.target. Feb 12 20:27:48.500031 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:27:48.500041 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:27:48.500052 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:27:48.500062 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:27:48.500072 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:27:48.500082 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:27:48.500092 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:27:48.500103 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:27:48.500113 systemd[1]: Mounting media.mount... Feb 12 20:27:48.500123 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:27:48.500133 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:27:48.500143 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:27:48.500153 systemd[1]: Mounting tmp.mount... Feb 12 20:27:48.500162 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:27:48.500173 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:27:48.500182 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:27:48.500193 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:27:48.500203 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:27:48.500213 systemd[1]: Starting modprobe@drm.service... Feb 12 20:27:48.500223 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:27:48.500233 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:27:48.500243 systemd[1]: Starting modprobe@loop.service... Feb 12 20:27:48.500254 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:27:48.500265 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:27:48.500275 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:27:48.500286 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:27:48.500296 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:27:48.500305 systemd[1]: Stopped systemd-journald.service. Feb 12 20:27:48.500315 kernel: loop: module loaded Feb 12 20:27:48.500325 systemd[1]: Starting systemd-journald.service... Feb 12 20:27:48.500334 kernel: fuse: init (API version 7.34) Feb 12 20:27:48.500906 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:27:48.500922 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:27:48.500933 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:27:48.500945 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:27:48.500955 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:27:48.500965 systemd[1]: Stopped verity-setup.service. Feb 12 20:27:48.500975 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:27:48.500985 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:27:48.501006 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:27:48.501017 systemd[1]: Mounted media.mount. Feb 12 20:27:48.501027 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:27:48.501036 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:27:48.501048 systemd[1]: Mounted tmp.mount. Feb 12 20:27:48.501064 systemd-journald[976]: Journal started Feb 12 20:27:48.501113 systemd-journald[976]: Runtime Journal (/run/log/journal/8bde0710549b429f9c8233f8e4f7740e) is 6.0M, max 48.5M, 42.5M free. Feb 12 20:27:45.992000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:27:46.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:27:46.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:27:46.211000 audit: BPF prog-id=10 op=LOAD Feb 12 20:27:46.211000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:27:46.211000 audit: BPF prog-id=11 op=LOAD Feb 12 20:27:46.211000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:27:46.243000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:27:46.243000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558ac a1=c0000d8de0 a2=c0000e1ac0 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:46.243000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:27:46.244000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:27:46.244000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155985 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:46.244000 audit: CWD cwd="/" Feb 12 20:27:46.244000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:46.244000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:46.244000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:27:48.389000 audit: BPF prog-id=12 op=LOAD Feb 12 20:27:48.389000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:27:48.390000 audit: BPF prog-id=13 op=LOAD Feb 12 20:27:48.390000 audit: BPF prog-id=14 op=LOAD Feb 12 20:27:48.390000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:27:48.390000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:27:48.390000 audit: BPF prog-id=15 op=LOAD Feb 12 20:27:48.390000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:27:48.390000 audit: BPF prog-id=16 op=LOAD Feb 12 20:27:48.390000 audit: BPF prog-id=17 op=LOAD Feb 12 20:27:48.390000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:27:48.390000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:27:48.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.403000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:27:48.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.478000 audit: BPF prog-id=18 op=LOAD Feb 12 20:27:48.478000 audit: BPF prog-id=19 op=LOAD Feb 12 20:27:48.478000 audit: BPF prog-id=20 op=LOAD Feb 12 20:27:48.478000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:27:48.478000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:27:48.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.502498 systemd[1]: Started systemd-journald.service. Feb 12 20:27:48.496000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:27:48.496000 audit[976]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe0dc76b10 a2=4000 a3=7ffe0dc76bac items=0 ppid=1 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:48.496000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:27:48.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:46.242185 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:27:48.389051 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:27:48.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:46.242402 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:27:48.389062 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 20:27:46.242426 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:27:48.392533 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:27:48.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:46.242460 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:27:48.503341 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:27:48.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:46.242473 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:27:48.504130 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:27:48.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:46.242507 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:27:48.504278 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:27:46.242523 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:27:48.510103 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:27:48.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:46.242753 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:27:48.510251 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:27:46.242796 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:27:48.511072 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:27:46.242812 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:27:48.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.511187 systemd[1]: Finished modprobe@drm.service. Feb 12 20:27:46.243087 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:27:48.511964 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:27:46.243116 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:27:48.512196 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:27:48.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:46.243131 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:27:48.513005 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:27:46.243143 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:27:48.513134 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:27:46.243158 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:27:48.513948 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:27:46.243171 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:27:48.514114 systemd[1]: Finished modprobe@loop.service. Feb 12 20:27:48.108335 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:27:48.515002 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:27:48.108583 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:27:48.515910 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:27:48.108672 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:27:48.516867 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:27:48.108829 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:27:48.517847 systemd[1]: Reached target network-pre.target. Feb 12 20:27:48.108873 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:27:48.108924 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T20:27:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:27:48.519755 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:27:48.521313 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:27:48.522073 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:27:48.523515 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:27:48.526426 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:27:48.527279 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:27:48.528128 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:27:48.528856 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:27:48.530054 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:27:48.531889 systemd-journald[976]: Time spent on flushing to /var/log/journal/8bde0710549b429f9c8233f8e4f7740e is 12.753ms for 1103 entries. Feb 12 20:27:48.531889 systemd-journald[976]: System Journal (/var/log/journal/8bde0710549b429f9c8233f8e4f7740e) is 8.0M, max 195.6M, 187.6M free. Feb 12 20:27:48.831396 systemd-journald[976]: Received client request to flush runtime journal. Feb 12 20:27:48.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:48.533496 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:27:48.534467 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:27:48.831902 udevadm[1006]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 20:27:48.535348 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:27:48.537640 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:27:48.550511 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:27:48.559963 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:27:48.592424 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:27:48.598945 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:27:48.600925 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:27:48.616089 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:27:48.708696 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:27:48.709535 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:27:48.832354 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:27:48.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.106218 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:27:49.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.106000 audit: BPF prog-id=21 op=LOAD Feb 12 20:27:49.106000 audit: BPF prog-id=22 op=LOAD Feb 12 20:27:49.106000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:27:49.106000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:27:49.108709 systemd[1]: Starting systemd-udevd.service... Feb 12 20:27:49.124479 systemd-udevd[1011]: Using default interface naming scheme 'v252'. Feb 12 20:27:49.136543 systemd[1]: Started systemd-udevd.service. Feb 12 20:27:49.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.137000 audit: BPF prog-id=23 op=LOAD Feb 12 20:27:49.139276 systemd[1]: Starting systemd-networkd.service... Feb 12 20:27:49.144000 audit: BPF prog-id=24 op=LOAD Feb 12 20:27:49.144000 audit: BPF prog-id=25 op=LOAD Feb 12 20:27:49.144000 audit: BPF prog-id=26 op=LOAD Feb 12 20:27:49.146209 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:27:49.157592 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:27:49.186640 systemd[1]: Started systemd-userdbd.service. Feb 12 20:27:49.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.193827 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:27:49.213070 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 20:27:49.213166 kernel: ACPI: button: Power Button [PWRF] Feb 12 20:27:49.213000 audit[1021]: AVC avc: denied { confidentiality } for pid=1021 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 20:27:49.213000 audit[1021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5582c0705b00 a1=32194 a2=7f37769bebc5 a3=5 items=108 ppid=1011 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:49.213000 audit: CWD cwd="/" Feb 12 20:27:49.213000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=1 name=(null) inode=11927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=2 name=(null) inode=11927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=3 name=(null) inode=11928 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=4 name=(null) inode=11927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=5 name=(null) inode=11929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=6 name=(null) inode=11927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=7 name=(null) inode=11930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=8 name=(null) inode=11930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=9 name=(null) inode=11931 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=10 name=(null) inode=11930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=11 name=(null) inode=11932 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=12 name=(null) inode=11930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=13 name=(null) inode=11933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=14 name=(null) inode=11930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=15 name=(null) inode=11934 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=16 name=(null) inode=11930 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=17 name=(null) inode=11935 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=18 name=(null) inode=11927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=19 name=(null) inode=11936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=20 name=(null) inode=11936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=21 name=(null) inode=11937 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=22 name=(null) inode=11936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=23 name=(null) inode=11938 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=24 name=(null) inode=11936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=25 name=(null) inode=11939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=26 name=(null) inode=11936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=27 name=(null) inode=11940 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=28 name=(null) inode=11936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=29 name=(null) inode=11941 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=30 name=(null) inode=11927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=31 name=(null) inode=11942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=32 name=(null) inode=11942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=33 name=(null) inode=11943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=34 name=(null) inode=11942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=35 name=(null) inode=11944 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=36 name=(null) inode=11942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=37 name=(null) inode=11945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=38 name=(null) inode=11942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=39 name=(null) inode=11946 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=40 name=(null) inode=11942 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=41 name=(null) inode=11947 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=42 name=(null) inode=11927 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=43 name=(null) inode=11948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=44 name=(null) inode=11948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=45 name=(null) inode=11949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=46 name=(null) inode=11948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=47 name=(null) inode=11950 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=48 name=(null) inode=11948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=49 name=(null) inode=11951 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=50 name=(null) inode=11948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=51 name=(null) inode=11952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=52 name=(null) inode=11948 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=53 name=(null) inode=11953 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=55 name=(null) inode=11954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=56 name=(null) inode=11954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=57 name=(null) inode=11955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=58 name=(null) inode=11954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=59 name=(null) inode=11956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=60 name=(null) inode=11954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=61 name=(null) inode=11957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=62 name=(null) inode=11957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=63 name=(null) inode=11958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=64 name=(null) inode=11957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=65 name=(null) inode=11959 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=66 name=(null) inode=11957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=67 name=(null) inode=11960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=68 name=(null) inode=11957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=69 name=(null) inode=11961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=70 name=(null) inode=11957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=71 name=(null) inode=11962 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=72 name=(null) inode=11954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=73 name=(null) inode=11963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=74 name=(null) inode=11963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=75 name=(null) inode=11964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=76 name=(null) inode=11963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=77 name=(null) inode=11965 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=78 name=(null) inode=11963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=79 name=(null) inode=11966 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=80 name=(null) inode=11963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=81 name=(null) inode=11967 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=82 name=(null) inode=11963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=83 name=(null) inode=11968 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=84 name=(null) inode=11954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=85 name=(null) inode=11969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=86 name=(null) inode=11969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=87 name=(null) inode=11970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=88 name=(null) inode=11969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=89 name=(null) inode=11971 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=90 name=(null) inode=11969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=91 name=(null) inode=11972 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=92 name=(null) inode=11969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=93 name=(null) inode=11973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=94 name=(null) inode=11969 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=95 name=(null) inode=11974 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=96 name=(null) inode=11954 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=97 name=(null) inode=11975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=98 name=(null) inode=11975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=99 name=(null) inode=11976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=100 name=(null) inode=11975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=101 name=(null) inode=11977 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=102 name=(null) inode=11975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=103 name=(null) inode=11978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=104 name=(null) inode=11975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=105 name=(null) inode=11979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=106 name=(null) inode=11975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PATH item=107 name=(null) inode=11980 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:49.213000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 20:27:49.226060 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 20:27:49.238021 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 20:27:49.261644 systemd-networkd[1022]: lo: Link UP Feb 12 20:27:49.261661 systemd-networkd[1022]: lo: Gained carrier Feb 12 20:27:49.262030 systemd-networkd[1022]: Enumeration completed Feb 12 20:27:49.262120 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:27:49.263134 systemd-networkd[1022]: eth0: Link UP Feb 12 20:27:49.263148 systemd-networkd[1022]: eth0: Gained carrier Feb 12 20:27:49.263472 systemd[1]: Started systemd-networkd.service. Feb 12 20:27:49.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.282230 systemd-networkd[1022]: eth0: DHCPv4 address 10.0.0.120/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 20:27:49.319029 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 20:27:49.331150 kernel: kvm: Nested Virtualization enabled Feb 12 20:27:49.331305 kernel: SVM: kvm: Nested Paging enabled Feb 12 20:27:49.331319 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 12 20:27:49.332097 kernel: SVM: Virtual GIF supported Feb 12 20:27:49.347022 kernel: EDAC MC: Ver: 3.0.0 Feb 12 20:27:49.366321 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:27:49.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.368086 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:27:49.374559 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:27:49.399832 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:27:49.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.400687 systemd[1]: Reached target cryptsetup.target. Feb 12 20:27:49.402361 systemd[1]: Starting lvm2-activation.service... Feb 12 20:27:49.405479 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:27:49.432058 systemd[1]: Finished lvm2-activation.service. Feb 12 20:27:49.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.432776 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:27:49.433429 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:27:49.433452 systemd[1]: Reached target local-fs.target. Feb 12 20:27:49.434017 systemd[1]: Reached target machines.target. Feb 12 20:27:49.435936 systemd[1]: Starting ldconfig.service... Feb 12 20:27:49.436730 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:27:49.436770 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:27:49.437617 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:27:49.438952 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:27:49.440931 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:27:49.441743 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:27:49.441778 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:27:49.442942 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:27:49.444543 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1049 (bootctl) Feb 12 20:27:49.445508 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:27:49.450373 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:27:49.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.460505 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:27:49.461396 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:27:49.462578 systemd-tmpfiles[1052]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:27:49.481720 systemd-fsck[1057]: fsck.fat 4.2 (2021-01-31) Feb 12 20:27:49.481720 systemd-fsck[1057]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 20:27:49.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.483215 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:27:49.497708 systemd[1]: Mounting boot.mount... Feb 12 20:27:49.951095 systemd[1]: Mounted boot.mount. Feb 12 20:27:49.963331 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:27:49.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:49.982328 ldconfig[1048]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:27:50.196992 systemd[1]: Finished ldconfig.service. Feb 12 20:27:50.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.202864 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:27:50.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.205305 systemd[1]: Starting audit-rules.service... Feb 12 20:27:50.206648 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:27:50.208349 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:27:50.209000 audit: BPF prog-id=27 op=LOAD Feb 12 20:27:50.211306 systemd[1]: Starting systemd-resolved.service... Feb 12 20:27:50.212000 audit: BPF prog-id=28 op=LOAD Feb 12 20:27:50.214353 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:27:50.215937 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:27:50.217247 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:27:50.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.218463 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:27:50.221209 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:27:50.221000 audit[1073]: SYSTEM_BOOT pid=1073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.221731 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:27:50.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.224918 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:27:50.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.231003 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:27:50.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.232855 systemd[1]: Starting systemd-update-done.service... Feb 12 20:27:50.238710 systemd[1]: Finished systemd-update-done.service. Feb 12 20:27:50.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:50.252000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:27:50.252000 audit[1083]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe6b989320 a2=420 a3=0 items=0 ppid=1061 pid=1083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:50.252000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:27:50.253840 augenrules[1083]: No rules Feb 12 20:27:50.254557 systemd[1]: Finished audit-rules.service. Feb 12 20:27:50.259675 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:27:50.260491 systemd[1]: Reached target time-set.target. Feb 12 20:27:50.260655 systemd-resolved[1065]: Positive Trust Anchors: Feb 12 20:27:50.260671 systemd-resolved[1065]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:27:50.260704 systemd-resolved[1065]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:27:50.260889 systemd-timesyncd[1072]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 20:27:50.260924 systemd-timesyncd[1072]: Initial clock synchronization to Mon 2024-02-12 20:27:50.646799 UTC. Feb 12 20:27:50.266783 systemd-resolved[1065]: Defaulting to hostname 'linux'. Feb 12 20:27:50.268081 systemd[1]: Started systemd-resolved.service. Feb 12 20:27:50.268718 systemd[1]: Reached target network.target. Feb 12 20:27:50.269274 systemd[1]: Reached target nss-lookup.target. Feb 12 20:27:50.269863 systemd[1]: Reached target sysinit.target. Feb 12 20:27:50.270471 systemd[1]: Started motdgen.path. Feb 12 20:27:50.270974 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:27:50.271871 systemd[1]: Started logrotate.timer. Feb 12 20:27:50.272432 systemd[1]: Started mdadm.timer. Feb 12 20:27:50.272916 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:27:50.273496 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:27:50.273522 systemd[1]: Reached target paths.target. Feb 12 20:27:50.274047 systemd[1]: Reached target timers.target. Feb 12 20:27:50.274810 systemd[1]: Listening on dbus.socket. Feb 12 20:27:50.276249 systemd[1]: Starting docker.socket... Feb 12 20:27:50.278489 systemd[1]: Listening on sshd.socket. Feb 12 20:27:50.279135 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:27:50.279433 systemd[1]: Listening on docker.socket. Feb 12 20:27:50.280029 systemd[1]: Reached target sockets.target. Feb 12 20:27:50.280620 systemd[1]: Reached target basic.target. Feb 12 20:27:50.281216 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:27:50.281240 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:27:50.282021 systemd[1]: Starting containerd.service... Feb 12 20:27:50.283267 systemd[1]: Starting dbus.service... Feb 12 20:27:50.284405 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:27:50.285739 systemd[1]: Starting extend-filesystems.service... Feb 12 20:27:50.286511 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:27:50.287371 systemd[1]: Starting motdgen.service... Feb 12 20:27:50.290408 jq[1093]: false Feb 12 20:27:50.291091 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:27:50.292475 systemd[1]: Starting prepare-critools.service... Feb 12 20:27:50.293864 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:27:50.295220 systemd[1]: Starting sshd-keygen.service... Feb 12 20:27:50.297518 systemd[1]: Starting systemd-logind.service... Feb 12 20:27:50.297958 extend-filesystems[1094]: Found sr0 Feb 12 20:27:50.297958 extend-filesystems[1094]: Found vda Feb 12 20:27:50.297958 extend-filesystems[1094]: Found vda1 Feb 12 20:27:50.297958 extend-filesystems[1094]: Found vda2 Feb 12 20:27:50.297958 extend-filesystems[1094]: Found vda3 Feb 12 20:27:50.297958 extend-filesystems[1094]: Found usr Feb 12 20:27:50.297958 extend-filesystems[1094]: Found vda4 Feb 12 20:27:50.297958 extend-filesystems[1094]: Found vda6 Feb 12 20:27:50.297958 extend-filesystems[1094]: Found vda7 Feb 12 20:27:50.297958 extend-filesystems[1094]: Found vda9 Feb 12 20:27:50.297958 extend-filesystems[1094]: Checking size of /dev/vda9 Feb 12 20:27:50.342377 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 20:27:50.298189 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:27:50.342658 extend-filesystems[1094]: Resized partition /dev/vda9 Feb 12 20:27:50.356977 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 20:27:50.314813 dbus-daemon[1092]: [system] SELinux support is enabled Feb 12 20:27:50.298230 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 20:27:50.374308 extend-filesystems[1123]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:27:50.375306 update_engine[1107]: I0212 20:27:50.346588 1107 main.cc:92] Flatcar Update Engine starting Feb 12 20:27:50.375306 update_engine[1107]: I0212 20:27:50.348187 1107 update_check_scheduler.cc:74] Next update check in 10m26s Feb 12 20:27:50.298541 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:27:50.375651 jq[1108]: true Feb 12 20:27:50.299268 systemd[1]: Starting update-engine.service... Feb 12 20:27:50.300620 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:27:50.376012 tar[1111]: crictl Feb 12 20:27:50.302565 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:27:50.376285 extend-filesystems[1123]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 20:27:50.376285 extend-filesystems[1123]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 20:27:50.376285 extend-filesystems[1123]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 20:27:50.380791 env[1112]: time="2024-02-12T20:27:50.375668371Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:27:50.302707 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:27:50.381121 extend-filesystems[1094]: Resized filesystem in /dev/vda9 Feb 12 20:27:50.386134 tar[1110]: ./ Feb 12 20:27:50.386134 tar[1110]: ./loopback Feb 12 20:27:50.303844 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:27:50.386841 jq[1115]: true Feb 12 20:27:50.303988 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:27:50.397697 tar[1110]: ./bandwidth Feb 12 20:27:50.315477 systemd[1]: Started dbus.service. Feb 12 20:27:50.398003 bash[1146]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:27:50.318422 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:27:50.318445 systemd[1]: Reached target system-config.target. Feb 12 20:27:50.328327 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:27:50.328346 systemd[1]: Reached target user-config.target. Feb 12 20:27:50.337612 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:27:50.337770 systemd[1]: Finished motdgen.service. Feb 12 20:27:50.348234 systemd[1]: Started update-engine.service. Feb 12 20:27:50.350650 systemd[1]: Started locksmithd.service. Feb 12 20:27:50.377332 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:27:50.377456 systemd[1]: Finished extend-filesystems.service. Feb 12 20:27:50.392321 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:27:50.398446 locksmithd[1147]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:27:50.398545 systemd-logind[1105]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 20:27:50.398564 systemd-logind[1105]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 20:27:50.398799 systemd-logind[1105]: New seat seat0. Feb 12 20:27:50.402897 systemd[1]: Started systemd-logind.service. Feb 12 20:27:50.415146 env[1112]: time="2024-02-12T20:27:50.415104402Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:27:50.415295 env[1112]: time="2024-02-12T20:27:50.415270614Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:27:50.416496 env[1112]: time="2024-02-12T20:27:50.416464803Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:27:50.416547 env[1112]: time="2024-02-12T20:27:50.416494299Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:27:50.416753 env[1112]: time="2024-02-12T20:27:50.416724140Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:27:50.416805 env[1112]: time="2024-02-12T20:27:50.416752613Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:27:50.416805 env[1112]: time="2024-02-12T20:27:50.416775566Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:27:50.416805 env[1112]: time="2024-02-12T20:27:50.416788881Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:27:50.416897 env[1112]: time="2024-02-12T20:27:50.416871727Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:27:50.417218 env[1112]: time="2024-02-12T20:27:50.417192198Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:27:50.417367 env[1112]: time="2024-02-12T20:27:50.417337931Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:27:50.417416 env[1112]: time="2024-02-12T20:27:50.417366284Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:27:50.417456 env[1112]: time="2024-02-12T20:27:50.417427259Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:27:50.417456 env[1112]: time="2024-02-12T20:27:50.417443539Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:27:50.425311 env[1112]: time="2024-02-12T20:27:50.425282753Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:27:50.425367 env[1112]: time="2024-02-12T20:27:50.425318430Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:27:50.425367 env[1112]: time="2024-02-12T20:27:50.425339019Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:27:50.425440 env[1112]: time="2024-02-12T20:27:50.425373273Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.425440 env[1112]: time="2024-02-12T20:27:50.425391227Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.425440 env[1112]: time="2024-02-12T20:27:50.425408880Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.425440 env[1112]: time="2024-02-12T20:27:50.425424900Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.425547 env[1112]: time="2024-02-12T20:27:50.425441030Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.425547 env[1112]: time="2024-02-12T20:27:50.425456830Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.425547 env[1112]: time="2024-02-12T20:27:50.425472710Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.425547 env[1112]: time="2024-02-12T20:27:50.425488389Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.425547 env[1112]: time="2024-02-12T20:27:50.425504529Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:27:50.425693 env[1112]: time="2024-02-12T20:27:50.425596652Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:27:50.425724 env[1112]: time="2024-02-12T20:27:50.425691069Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.425970233Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426030035Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426048991Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426101028Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426116097Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426130894Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426145031Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426160209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426174706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426188863Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426202469Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426219490Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426317705Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426330980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428012 env[1112]: time="2024-02-12T20:27:50.426342251Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428306 env[1112]: time="2024-02-12T20:27:50.426352600Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:27:50.428306 env[1112]: time="2024-02-12T20:27:50.426364583Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:27:50.428306 env[1112]: time="2024-02-12T20:27:50.426375062Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:27:50.428306 env[1112]: time="2024-02-12T20:27:50.426393417Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:27:50.428306 env[1112]: time="2024-02-12T20:27:50.426425016Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:27:50.428401 env[1112]: time="2024-02-12T20:27:50.426590236Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:27:50.428401 env[1112]: time="2024-02-12T20:27:50.426643295Z" level=info msg="Connect containerd service" Feb 12 20:27:50.428401 env[1112]: time="2024-02-12T20:27:50.426674484Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:27:50.428401 env[1112]: time="2024-02-12T20:27:50.427426935Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:27:50.429027 env[1112]: time="2024-02-12T20:27:50.428553779Z" level=info msg="Start subscribing containerd event" Feb 12 20:27:50.429027 env[1112]: time="2024-02-12T20:27:50.428595898Z" level=info msg="Start recovering state" Feb 12 20:27:50.429027 env[1112]: time="2024-02-12T20:27:50.428769724Z" level=info msg="Start event monitor" Feb 12 20:27:50.430029 env[1112]: time="2024-02-12T20:27:50.428784892Z" level=info msg="Start snapshots syncer" Feb 12 20:27:50.430029 env[1112]: time="2024-02-12T20:27:50.429104582Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:27:50.430029 env[1112]: time="2024-02-12T20:27:50.429120051Z" level=info msg="Start streaming server" Feb 12 20:27:50.430029 env[1112]: time="2024-02-12T20:27:50.428964860Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:27:50.430029 env[1112]: time="2024-02-12T20:27:50.429250175Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:27:50.430029 env[1112]: time="2024-02-12T20:27:50.429290701Z" level=info msg="containerd successfully booted in 0.059882s" Feb 12 20:27:50.429393 systemd[1]: Started containerd.service. Feb 12 20:27:50.434929 tar[1110]: ./ptp Feb 12 20:27:50.466523 tar[1110]: ./vlan Feb 12 20:27:50.495669 tar[1110]: ./host-device Feb 12 20:27:50.526836 tar[1110]: ./tuning Feb 12 20:27:50.555194 tar[1110]: ./vrf Feb 12 20:27:50.585585 tar[1110]: ./sbr Feb 12 20:27:50.614865 tar[1110]: ./tap Feb 12 20:27:50.653696 tar[1110]: ./dhcp Feb 12 20:27:50.744459 tar[1110]: ./static Feb 12 20:27:50.768100 tar[1110]: ./firewall Feb 12 20:27:50.772245 systemd[1]: Finished prepare-critools.service. Feb 12 20:27:50.800650 tar[1110]: ./macvlan Feb 12 20:27:50.829653 tar[1110]: ./dummy Feb 12 20:27:50.858339 tar[1110]: ./bridge Feb 12 20:27:50.889776 tar[1110]: ./ipvlan Feb 12 20:27:50.892524 systemd[1]: Created slice system-sshd.slice. Feb 12 20:27:50.920469 tar[1110]: ./portmap Feb 12 20:27:50.948602 tar[1110]: ./host-local Feb 12 20:27:50.981944 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:27:51.198245 systemd-networkd[1022]: eth0: Gained IPv6LL Feb 12 20:27:51.523821 sshd_keygen[1126]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:27:51.542780 systemd[1]: Finished sshd-keygen.service. Feb 12 20:27:51.545177 systemd[1]: Starting issuegen.service... Feb 12 20:27:51.546839 systemd[1]: Started sshd@0-10.0.0.120:22-10.0.0.1:39138.service. Feb 12 20:27:51.550295 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:27:51.550433 systemd[1]: Finished issuegen.service. Feb 12 20:27:51.552486 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:27:51.558310 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:27:51.561075 systemd[1]: Started getty@tty1.service. Feb 12 20:27:51.563176 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:27:51.564227 systemd[1]: Reached target getty.target. Feb 12 20:27:51.565084 systemd[1]: Reached target multi-user.target. Feb 12 20:27:51.567493 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:27:51.574739 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:27:51.574886 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:27:51.575747 systemd[1]: Startup finished in 575ms (kernel) + 5.256s (initrd) + 5.619s (userspace) = 11.451s. Feb 12 20:27:51.585743 sshd[1170]: Accepted publickey for core from 10.0.0.1 port 39138 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:51.587320 sshd[1170]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:51.597260 systemd-logind[1105]: New session 1 of user core. Feb 12 20:27:51.598463 systemd[1]: Created slice user-500.slice. Feb 12 20:27:51.599825 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:27:51.607768 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:27:51.609215 systemd[1]: Starting user@500.service... Feb 12 20:27:51.611979 (systemd)[1179]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:51.683668 systemd[1179]: Queued start job for default target default.target. Feb 12 20:27:51.684121 systemd[1179]: Reached target paths.target. Feb 12 20:27:51.684147 systemd[1179]: Reached target sockets.target. Feb 12 20:27:51.684163 systemd[1179]: Reached target timers.target. Feb 12 20:27:51.684178 systemd[1179]: Reached target basic.target. Feb 12 20:27:51.684223 systemd[1179]: Reached target default.target. Feb 12 20:27:51.684252 systemd[1179]: Startup finished in 66ms. Feb 12 20:27:51.684385 systemd[1]: Started user@500.service. Feb 12 20:27:51.685627 systemd[1]: Started session-1.scope. Feb 12 20:27:51.740546 systemd[1]: Started sshd@1-10.0.0.120:22-10.0.0.1:39148.service. Feb 12 20:27:51.773615 sshd[1188]: Accepted publickey for core from 10.0.0.1 port 39148 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:51.774793 sshd[1188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:51.778673 systemd-logind[1105]: New session 2 of user core. Feb 12 20:27:51.779493 systemd[1]: Started session-2.scope. Feb 12 20:27:51.835773 sshd[1188]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:51.838322 systemd[1]: sshd@1-10.0.0.120:22-10.0.0.1:39148.service: Deactivated successfully. Feb 12 20:27:51.838889 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:27:51.839431 systemd-logind[1105]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:27:51.840834 systemd[1]: Started sshd@2-10.0.0.120:22-10.0.0.1:39164.service. Feb 12 20:27:51.841607 systemd-logind[1105]: Removed session 2. Feb 12 20:27:51.873123 sshd[1194]: Accepted publickey for core from 10.0.0.1 port 39164 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:51.874189 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:51.877600 systemd-logind[1105]: New session 3 of user core. Feb 12 20:27:51.878424 systemd[1]: Started session-3.scope. Feb 12 20:27:51.929729 sshd[1194]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:51.932506 systemd[1]: sshd@2-10.0.0.120:22-10.0.0.1:39164.service: Deactivated successfully. Feb 12 20:27:51.932973 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:27:51.933443 systemd-logind[1105]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:27:51.934412 systemd[1]: Started sshd@3-10.0.0.120:22-10.0.0.1:39176.service. Feb 12 20:27:51.935019 systemd-logind[1105]: Removed session 3. Feb 12 20:27:51.964633 sshd[1200]: Accepted publickey for core from 10.0.0.1 port 39176 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:51.965690 sshd[1200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:51.968840 systemd-logind[1105]: New session 4 of user core. Feb 12 20:27:51.969630 systemd[1]: Started session-4.scope. Feb 12 20:27:52.024414 sshd[1200]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:52.027180 systemd[1]: sshd@3-10.0.0.120:22-10.0.0.1:39176.service: Deactivated successfully. Feb 12 20:27:52.027838 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:27:52.028446 systemd-logind[1105]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:27:52.029631 systemd[1]: Started sshd@4-10.0.0.120:22-10.0.0.1:39186.service. Feb 12 20:27:52.030379 systemd-logind[1105]: Removed session 4. Feb 12 20:27:52.061105 sshd[1206]: Accepted publickey for core from 10.0.0.1 port 39186 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:52.062217 sshd[1206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:52.065553 systemd-logind[1105]: New session 5 of user core. Feb 12 20:27:52.066373 systemd[1]: Started session-5.scope. Feb 12 20:27:52.124030 sudo[1209]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:27:52.124209 sudo[1209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:27:52.140343 dbus-daemon[1092]: \xd0]k!OV: received setenforce notice (enforcing=1657058016) Feb 12 20:27:52.142490 sudo[1209]: pam_unix(sudo:session): session closed for user root Feb 12 20:27:52.144285 sshd[1206]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:52.146749 systemd[1]: sshd@4-10.0.0.120:22-10.0.0.1:39186.service: Deactivated successfully. Feb 12 20:27:52.147278 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:27:52.147890 systemd-logind[1105]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:27:52.148817 systemd[1]: Started sshd@5-10.0.0.120:22-10.0.0.1:39202.service. Feb 12 20:27:52.149374 systemd-logind[1105]: Removed session 5. Feb 12 20:27:52.181267 sshd[1213]: Accepted publickey for core from 10.0.0.1 port 39202 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:52.182651 sshd[1213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:52.186067 systemd-logind[1105]: New session 6 of user core. Feb 12 20:27:52.186778 systemd[1]: Started session-6.scope. Feb 12 20:27:52.240720 sudo[1217]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:27:52.240881 sudo[1217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:27:52.243841 sudo[1217]: pam_unix(sudo:session): session closed for user root Feb 12 20:27:52.247700 sudo[1216]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:27:52.247876 sudo[1216]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:27:52.256005 systemd[1]: Stopping audit-rules.service... Feb 12 20:27:52.256000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:27:52.257852 auditctl[1220]: No rules Feb 12 20:27:52.258286 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:27:52.258410 kernel: kauditd_printk_skb: 244 callbacks suppressed Feb 12 20:27:52.258437 kernel: audit: type=1305 audit(1707769672.256:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:27:52.258494 systemd[1]: Stopped audit-rules.service. Feb 12 20:27:52.256000 audit[1220]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde572d250 a2=420 a3=0 items=0 ppid=1 pid=1220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:52.260236 systemd[1]: Starting audit-rules.service... Feb 12 20:27:52.263641 kernel: audit: type=1300 audit(1707769672.256:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde572d250 a2=420 a3=0 items=0 ppid=1 pid=1220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:52.263744 kernel: audit: type=1327 audit(1707769672.256:166): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:27:52.256000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:27:52.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.266798 kernel: audit: type=1131 audit(1707769672.257:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.277273 augenrules[1237]: No rules Feb 12 20:27:52.277863 systemd[1]: Finished audit-rules.service. Feb 12 20:27:52.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.279017 sudo[1216]: pam_unix(sudo:session): session closed for user root Feb 12 20:27:52.278000 audit[1216]: USER_END pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.281006 sshd[1213]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:52.283523 kernel: audit: type=1130 audit(1707769672.277:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.283567 kernel: audit: type=1106 audit(1707769672.278:169): pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.283636 kernel: audit: type=1104 audit(1707769672.278:170): pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.278000 audit[1216]: CRED_DISP pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.283506 systemd[1]: sshd@5-10.0.0.120:22-10.0.0.1:39202.service: Deactivated successfully. Feb 12 20:27:52.284351 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:27:52.284909 systemd-logind[1105]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:27:52.280000 audit[1213]: USER_END pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:52.288672 systemd[1]: Started sshd@6-10.0.0.120:22-10.0.0.1:39216.service. Feb 12 20:27:52.289275 systemd-logind[1105]: Removed session 6. Feb 12 20:27:52.290269 kernel: audit: type=1106 audit(1707769672.280:171): pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:52.290306 kernel: audit: type=1104 audit(1707769672.281:172): pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:52.281000 audit[1213]: CRED_DISP pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:52.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.120:22-10.0.0.1:39202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.295338 kernel: audit: type=1131 audit(1707769672.282:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.120:22-10.0.0.1:39202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.120:22-10.0.0.1:39216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.319000 audit[1243]: USER_ACCT pid=1243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:52.321220 sshd[1243]: Accepted publickey for core from 10.0.0.1 port 39216 ssh2: RSA SHA256:0TYEZ+ET1/q46mu/UgoG+6MHo530B5lZPCcmxDlyeg8 Feb 12 20:27:52.320000 audit[1243]: CRED_ACQ pid=1243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:52.320000 audit[1243]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd012413e0 a2=3 a3=0 items=0 ppid=1 pid=1243 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:52.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:27:52.322463 sshd[1243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:27:52.326313 systemd-logind[1105]: New session 7 of user core. Feb 12 20:27:52.327265 systemd[1]: Started session-7.scope. Feb 12 20:27:52.330000 audit[1243]: USER_START pid=1243 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:52.331000 audit[1245]: CRED_ACQ pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:52.381000 audit[1246]: USER_ACCT pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.382000 audit[1246]: CRED_REFR pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.383016 sudo[1246]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:27:52.383205 sudo[1246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:27:52.383000 audit[1246]: USER_START pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:52.894160 systemd[1]: Reloading. Feb 12 20:27:52.953806 /usr/lib/systemd/system-generators/torcx-generator[1278]: time="2024-02-12T20:27:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:27:52.953834 /usr/lib/systemd/system-generators/torcx-generator[1278]: time="2024-02-12T20:27:52Z" level=info msg="torcx already run" Feb 12 20:27:53.027242 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:27:53.027265 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:27:53.055994 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.112000 audit: BPF prog-id=34 op=LOAD Feb 12 20:27:53.112000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.113000 audit: BPF prog-id=35 op=LOAD Feb 12 20:27:53.113000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit: BPF prog-id=36 op=LOAD Feb 12 20:27:53.114000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit: BPF prog-id=37 op=LOAD Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.114000 audit: BPF prog-id=38 op=LOAD Feb 12 20:27:53.114000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:27:53.114000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit: BPF prog-id=39 op=LOAD Feb 12 20:27:53.115000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit: BPF prog-id=40 op=LOAD Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.115000 audit: BPF prog-id=41 op=LOAD Feb 12 20:27:53.115000 audit: BPF prog-id=30 op=UNLOAD Feb 12 20:27:53.115000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit: BPF prog-id=42 op=LOAD Feb 12 20:27:53.116000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit: BPF prog-id=43 op=LOAD Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.116000 audit: BPF prog-id=44 op=LOAD Feb 12 20:27:53.116000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:27:53.116000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.118000 audit: BPF prog-id=45 op=LOAD Feb 12 20:27:53.118000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit: BPF prog-id=46 op=LOAD Feb 12 20:27:53.119000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit: BPF prog-id=47 op=LOAD Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:53.119000 audit: BPF prog-id=48 op=LOAD Feb 12 20:27:53.119000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:27:53.119000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:27:53.126612 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:27:54.080538 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:27:54.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:54.081140 systemd[1]: Reached target network-online.target. Feb 12 20:27:54.082656 systemd[1]: Started kubelet.service. Feb 12 20:27:54.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:54.091504 systemd[1]: Starting coreos-metadata.service... Feb 12 20:27:54.097664 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 12 20:27:54.097838 systemd[1]: Finished coreos-metadata.service. Feb 12 20:27:54.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:54.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:54.136663 kubelet[1317]: E0212 20:27:54.136554 1317 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 20:27:54.138823 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:27:54.138940 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:27:54.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:27:54.280999 systemd[1]: Stopped kubelet.service. Feb 12 20:27:54.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:54.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:54.291837 systemd[1]: Reloading. Feb 12 20:27:54.344357 /usr/lib/systemd/system-generators/torcx-generator[1384]: time="2024-02-12T20:27:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:27:54.345350 /usr/lib/systemd/system-generators/torcx-generator[1384]: time="2024-02-12T20:27:54Z" level=info msg="torcx already run" Feb 12 20:27:54.400776 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:27:54.400794 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:27:54.419736 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.472000 audit: BPF prog-id=49 op=LOAD Feb 12 20:27:54.472000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit: BPF prog-id=50 op=LOAD Feb 12 20:27:54.474000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit: BPF prog-id=51 op=LOAD Feb 12 20:27:54.474000 audit: BPF prog-id=36 op=UNLOAD Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit: BPF prog-id=52 op=LOAD Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.474000 audit: BPF prog-id=53 op=LOAD Feb 12 20:27:54.474000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:27:54.474000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.475000 audit: BPF prog-id=54 op=LOAD Feb 12 20:27:54.475000 audit: BPF prog-id=39 op=UNLOAD Feb 12 20:27:54.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit: BPF prog-id=55 op=LOAD Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit: BPF prog-id=56 op=LOAD Feb 12 20:27:54.476000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:27:54.476000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit: BPF prog-id=57 op=LOAD Feb 12 20:27:54.476000 audit: BPF prog-id=42 op=UNLOAD Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit: BPF prog-id=58 op=LOAD Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.476000 audit: BPF prog-id=59 op=LOAD Feb 12 20:27:54.476000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:27:54.476000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.478000 audit: BPF prog-id=60 op=LOAD Feb 12 20:27:54.478000 audit: BPF prog-id=45 op=UNLOAD Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit: BPF prog-id=61 op=LOAD Feb 12 20:27:54.479000 audit: BPF prog-id=46 op=UNLOAD Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit: BPF prog-id=62 op=LOAD Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.480000 audit: BPF prog-id=63 op=LOAD Feb 12 20:27:54.480000 audit: BPF prog-id=47 op=UNLOAD Feb 12 20:27:54.480000 audit: BPF prog-id=48 op=UNLOAD Feb 12 20:27:54.491800 systemd[1]: Started kubelet.service. Feb 12 20:27:54.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:54.526524 kubelet[1425]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:27:54.526524 kubelet[1425]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:27:54.526524 kubelet[1425]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:27:54.526868 kubelet[1425]: I0212 20:27:54.526553 1425 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:27:54.808401 kubelet[1425]: I0212 20:27:54.808362 1425 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 20:27:54.808401 kubelet[1425]: I0212 20:27:54.808394 1425 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:27:54.808622 kubelet[1425]: I0212 20:27:54.808606 1425 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 20:27:54.810282 kubelet[1425]: I0212 20:27:54.810254 1425 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:27:54.817355 kubelet[1425]: I0212 20:27:54.817315 1425 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:27:54.817562 kubelet[1425]: I0212 20:27:54.817543 1425 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:27:54.817727 kubelet[1425]: I0212 20:27:54.817708 1425 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 20:27:54.817847 kubelet[1425]: I0212 20:27:54.817734 1425 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 20:27:54.817847 kubelet[1425]: I0212 20:27:54.817744 1425 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 20:27:54.817928 kubelet[1425]: I0212 20:27:54.817864 1425 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:27:54.817968 kubelet[1425]: I0212 20:27:54.817952 1425 kubelet.go:393] "Attempting to sync node with API server" Feb 12 20:27:54.817998 kubelet[1425]: I0212 20:27:54.817969 1425 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:27:54.818054 kubelet[1425]: I0212 20:27:54.817997 1425 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:27:54.818054 kubelet[1425]: I0212 20:27:54.818017 1425 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:27:54.818134 kubelet[1425]: E0212 20:27:54.818115 1425 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:54.818165 kubelet[1425]: E0212 20:27:54.818153 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:54.818674 kubelet[1425]: I0212 20:27:54.818657 1425 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:27:54.818935 kubelet[1425]: W0212 20:27:54.818918 1425 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:27:54.819378 kubelet[1425]: I0212 20:27:54.819360 1425 server.go:1232] "Started kubelet" Feb 12 20:27:54.819656 kubelet[1425]: I0212 20:27:54.819636 1425 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:27:54.820022 kubelet[1425]: I0212 20:27:54.819638 1425 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:27:54.820186 kubelet[1425]: E0212 20:27:54.820163 1425 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:27:54.820238 kubelet[1425]: E0212 20:27:54.820189 1425 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:27:54.820238 kubelet[1425]: I0212 20:27:54.820061 1425 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 20:27:54.819000 audit[1425]: AVC avc: denied { mac_admin } for pid=1425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.819000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:54.819000 audit[1425]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfeea0 a1=c0001510b0 a2=c000dfee70 a3=25 items=0 ppid=1 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.819000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:54.819000 audit[1425]: AVC avc: denied { mac_admin } for pid=1425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:54.819000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:54.819000 audit[1425]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000131060 a1=c0001510c8 a2=c000dfef30 a3=25 items=0 ppid=1 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.819000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:54.820664 kubelet[1425]: I0212 20:27:54.820296 1425 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:27:54.820664 kubelet[1425]: I0212 20:27:54.820326 1425 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:27:54.820664 kubelet[1425]: I0212 20:27:54.820383 1425 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:27:54.820664 kubelet[1425]: I0212 20:27:54.820576 1425 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 20:27:54.821432 kubelet[1425]: E0212 20:27:54.821412 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:54.821631 kubelet[1425]: I0212 20:27:54.821614 1425 server.go:462] "Adding debug handlers to kubelet server" Feb 12 20:27:54.821872 kubelet[1425]: I0212 20:27:54.821838 1425 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 20:27:54.821952 kubelet[1425]: I0212 20:27:54.821936 1425 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 20:27:54.829907 kubelet[1425]: E0212 20:27:54.829578 1425 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 20:27:54.829907 kubelet[1425]: E0212 20:27:54.829629 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3377899ca6af4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 819332852, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 819332852, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:54.829907 kubelet[1425]: W0212 20:27:54.829891 1425 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:27:54.830208 kubelet[1425]: E0212 20:27:54.829920 1425 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:27:54.830208 kubelet[1425]: W0212 20:27:54.830007 1425 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:27:54.830208 kubelet[1425]: E0212 20:27:54.830019 1425 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:27:54.830208 kubelet[1425]: W0212 20:27:54.830075 1425 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:27:54.830208 kubelet[1425]: E0212 20:27:54.830087 1425 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:27:54.832098 kubelet[1425]: E0212 20:27:54.831289 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b3377899d7527c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 820178556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 820178556, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:54.837755 kubelet[1425]: I0212 20:27:54.837732 1425 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:27:54.837828 kubelet[1425]: I0212 20:27:54.837754 1425 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:27:54.837828 kubelet[1425]: I0212 20:27:54.837785 1425 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:27:54.837887 kubelet[1425]: E0212 20:27:54.837748 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3a273", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836714099, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836714099, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:54.838539 kubelet[1425]: E0212 20:27:54.838485 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3b4ac", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836718764, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836718764, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:54.839220 kubelet[1425]: E0212 20:27:54.839136 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3bfbe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836721598, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836721598, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:54.845000 audit[1438]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:54.845000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd77bb97f0 a2=0 a3=7ffd77bb97dc items=0 ppid=1425 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:27:54.846000 audit[1445]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:54.846000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffff57b98b0 a2=0 a3=7ffff57b989c items=0 ppid=1425 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:27:54.847000 audit[1447]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:54.847000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc8b16400 a2=0 a3=7ffcc8b163ec items=0 ppid=1425 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:27:54.870000 audit[1452]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:54.870000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdf980b470 a2=0 a3=7ffdf980b45c items=0 ppid=1425 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.870000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:27:54.873253 kubelet[1425]: I0212 20:27:54.873216 1425 policy_none.go:49] "None policy: Start" Feb 12 20:27:54.873963 kubelet[1425]: I0212 20:27:54.873950 1425 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:27:54.874036 kubelet[1425]: I0212 20:27:54.873967 1425 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:27:54.922978 kubelet[1425]: I0212 20:27:54.922944 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 12 20:27:54.924349 kubelet[1425]: E0212 20:27:54.924281 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3a273", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836714099, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 922904995, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3a273" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:54.924503 kubelet[1425]: E0212 20:27:54.924425 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 12 20:27:54.925086 kubelet[1425]: E0212 20:27:54.924967 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3b4ac", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836718764, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 922912855, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3b4ac" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:54.925883 kubelet[1425]: E0212 20:27:54.925827 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3bfbe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836721598, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 922915875, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3bfbe" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:54.989000 audit[1457]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:54.989000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdbb184b50 a2=0 a3=7ffdbb184b3c items=0 ppid=1425 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:27:54.991362 kubelet[1425]: I0212 20:27:54.991246 1425 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 20:27:54.990000 audit[1458]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:54.990000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb41e7340 a2=0 a3=7ffeb41e732c items=0 ppid=1425 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:27:54.992172 kubelet[1425]: I0212 20:27:54.992143 1425 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 20:27:54.992206 kubelet[1425]: I0212 20:27:54.992179 1425 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 20:27:54.992206 kubelet[1425]: I0212 20:27:54.992200 1425 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 20:27:54.992262 kubelet[1425]: E0212 20:27:54.992250 1425 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:27:54.991000 audit[1459]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:54.991000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7fa45ea0 a2=0 a3=7fff7fa45e8c items=0 ppid=1425 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:27:54.991000 audit[1460]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:54.991000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda6509f50 a2=0 a3=7ffda6509f3c items=0 ppid=1425 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:27:54.993713 kubelet[1425]: W0212 20:27:54.993697 1425 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:27:54.993785 kubelet[1425]: E0212 20:27:54.993730 1425 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:27:54.992000 audit[1462]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:54.992000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd4b3e3c70 a2=0 a3=7ffd4b3e3c5c items=0 ppid=1425 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:27:54.993000 audit[1461]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:54.993000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd297c9e20 a2=0 a3=7ffd297c9e0c items=0 ppid=1425 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:27:54.993000 audit[1463]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:27:54.993000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff04459910 a2=0 a3=7fff044598fc items=0 ppid=1425 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:27:54.993000 audit[1464]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:27:54.993000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff8b665770 a2=0 a3=7fff8b66575c items=0 ppid=1425 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:54.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:27:55.030839 kubelet[1425]: E0212 20:27:55.030806 1425 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 20:27:55.044188 systemd[1]: Created slice kubepods.slice. Feb 12 20:27:55.047409 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:27:55.049371 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:27:55.060000 audit[1425]: AVC avc: denied { mac_admin } for pid=1425 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:55.060000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:27:55.060000 audit[1425]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cd8de0 a1=c000d7b830 a2=c000cd8db0 a3=25 items=0 ppid=1 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:55.060000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:27:55.062674 kubelet[1425]: I0212 20:27:55.061542 1425 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:27:55.062674 kubelet[1425]: I0212 20:27:55.061615 1425 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:27:55.062674 kubelet[1425]: I0212 20:27:55.061814 1425 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:27:55.062674 kubelet[1425]: E0212 20:27:55.062570 1425 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.120\" not found" Feb 12 20:27:55.064065 kubelet[1425]: E0212 20:27:55.063982 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b33778a84b8fca", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 55, 62677450, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 55, 62677450, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:55.124941 kubelet[1425]: I0212 20:27:55.124905 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 12 20:27:55.125721 kubelet[1425]: E0212 20:27:55.125704 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 12 20:27:55.125889 kubelet[1425]: E0212 20:27:55.125836 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3a273", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836714099, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 55, 124876566, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3a273" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:55.126414 kubelet[1425]: E0212 20:27:55.126373 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3b4ac", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836718764, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 55, 124881829, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3b4ac" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:55.126978 kubelet[1425]: E0212 20:27:55.126939 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3bfbe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836721598, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 55, 124884302, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3bfbe" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:55.432602 kubelet[1425]: E0212 20:27:55.432565 1425 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 20:27:55.527266 kubelet[1425]: I0212 20:27:55.527231 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 12 20:27:55.530219 kubelet[1425]: E0212 20:27:55.530201 1425 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 12 20:27:55.530280 kubelet[1425]: E0212 20:27:55.530208 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3a273", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836714099, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 55, 527177418, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3a273" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:55.531532 kubelet[1425]: E0212 20:27:55.531474 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3b4ac", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836718764, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 55, 527192892, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3b4ac" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:55.532276 kubelet[1425]: E0212 20:27:55.532175 1425 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b337789ad3bfbe", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 27, 54, 836721598, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 27, 55, 527196178, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b337789ad3bfbe" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:27:55.709602 kubelet[1425]: W0212 20:27:55.709464 1425 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:27:55.709602 kubelet[1425]: E0212 20:27:55.709500 1425 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:27:55.810941 kubelet[1425]: I0212 20:27:55.810873 1425 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 20:27:55.819195 kubelet[1425]: E0212 20:27:55.819132 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:56.238248 kubelet[1425]: E0212 20:27:56.238179 1425 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.120\" not found" node="10.0.0.120" Feb 12 20:27:56.238248 kubelet[1425]: E0212 20:27:56.238209 1425 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.120" not found Feb 12 20:27:56.331207 kubelet[1425]: I0212 20:27:56.331181 1425 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 12 20:27:56.334097 kubelet[1425]: I0212 20:27:56.334078 1425 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.120" Feb 12 20:27:56.441433 kubelet[1425]: E0212 20:27:56.441387 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:56.504000 audit[1246]: USER_END pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:56.504000 audit[1246]: CRED_DISP pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:27:56.505674 sudo[1246]: pam_unix(sudo:session): session closed for user root Feb 12 20:27:56.506834 sshd[1243]: pam_unix(sshd:session): session closed for user core Feb 12 20:27:56.506000 audit[1243]: USER_END pid=1243 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.506000 audit[1243]: CRED_DISP pid=1243 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 20:27:56.509037 systemd[1]: sshd@6-10.0.0.120:22-10.0.0.1:39216.service: Deactivated successfully. Feb 12 20:27:56.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.120:22-10.0.0.1:39216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:27:56.509932 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:27:56.510613 systemd-logind[1105]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:27:56.511468 systemd-logind[1105]: Removed session 7. Feb 12 20:27:56.542074 kubelet[1425]: E0212 20:27:56.542037 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:56.643251 kubelet[1425]: E0212 20:27:56.643192 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:56.743345 kubelet[1425]: E0212 20:27:56.743293 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:56.819288 kubelet[1425]: E0212 20:27:56.819216 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:56.844067 kubelet[1425]: E0212 20:27:56.844037 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:56.945188 kubelet[1425]: E0212 20:27:56.945149 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:57.046003 kubelet[1425]: E0212 20:27:57.045969 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:57.146791 kubelet[1425]: E0212 20:27:57.146749 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:57.247236 kubelet[1425]: E0212 20:27:57.247167 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:57.347655 kubelet[1425]: E0212 20:27:57.347602 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:57.448105 kubelet[1425]: E0212 20:27:57.447975 1425 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 12 20:27:57.549009 kubelet[1425]: I0212 20:27:57.548970 1425 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 20:27:57.549401 kubelet[1425]: I0212 20:27:57.549354 1425 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 20:27:57.549440 env[1112]: time="2024-02-12T20:27:57.549216367Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:27:57.819826 kubelet[1425]: E0212 20:27:57.819689 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:57.819826 kubelet[1425]: I0212 20:27:57.819714 1425 apiserver.go:52] "Watching apiserver" Feb 12 20:27:57.822414 kubelet[1425]: I0212 20:27:57.822396 1425 topology_manager.go:215] "Topology Admit Handler" podUID="93bb6681-d659-4b2d-9ec7-7c679e51dd3a" podNamespace="calico-system" podName="calico-node-4nkpg" Feb 12 20:27:57.822483 kubelet[1425]: I0212 20:27:57.822478 1425 topology_manager.go:215] "Topology Admit Handler" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" podNamespace="calico-system" podName="csi-node-driver-2fgql" Feb 12 20:27:57.822544 kubelet[1425]: I0212 20:27:57.822534 1425 topology_manager.go:215] "Topology Admit Handler" podUID="8da8ca9e-6c21-4439-9e14-0968e1d5a1c0" podNamespace="kube-system" podName="kube-proxy-gxppn" Feb 12 20:27:57.822820 kubelet[1425]: E0212 20:27:57.822792 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:27:57.827182 systemd[1]: Created slice kubepods-besteffort-pod93bb6681_d659_4b2d_9ec7_7c679e51dd3a.slice. Feb 12 20:27:57.843167 systemd[1]: Created slice kubepods-besteffort-pod8da8ca9e_6c21_4439_9e14_0968e1d5a1c0.slice. Feb 12 20:27:57.922835 kubelet[1425]: I0212 20:27:57.922786 1425 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 20:27:57.937851 kubelet[1425]: I0212 20:27:57.937833 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-lib-modules\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.937851 kubelet[1425]: I0212 20:27:57.937864 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-tigera-ca-bundle\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.937985 kubelet[1425]: I0212 20:27:57.937881 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-var-lib-calico\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.937985 kubelet[1425]: I0212 20:27:57.937916 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-cni-log-dir\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.937985 kubelet[1425]: I0212 20:27:57.937963 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/db2a6781-a9c3-49b8-96ef-9701953605c5-varrun\") pod \"csi-node-driver-2fgql\" (UID: \"db2a6781-a9c3-49b8-96ef-9701953605c5\") " pod="calico-system/csi-node-driver-2fgql" Feb 12 20:27:57.938134 kubelet[1425]: I0212 20:27:57.938014 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8da8ca9e-6c21-4439-9e14-0968e1d5a1c0-lib-modules\") pod \"kube-proxy-gxppn\" (UID: \"8da8ca9e-6c21-4439-9e14-0968e1d5a1c0\") " pod="kube-system/kube-proxy-gxppn" Feb 12 20:27:57.938134 kubelet[1425]: I0212 20:27:57.938052 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-policysync\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.938134 kubelet[1425]: I0212 20:27:57.938111 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-node-certs\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.938242 kubelet[1425]: I0212 20:27:57.938153 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-var-run-calico\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.938242 kubelet[1425]: I0212 20:27:57.938180 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-cni-net-dir\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.938242 kubelet[1425]: I0212 20:27:57.938214 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-flexvol-driver-host\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.938242 kubelet[1425]: I0212 20:27:57.938242 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/db2a6781-a9c3-49b8-96ef-9701953605c5-registration-dir\") pod \"csi-node-driver-2fgql\" (UID: \"db2a6781-a9c3-49b8-96ef-9701953605c5\") " pod="calico-system/csi-node-driver-2fgql" Feb 12 20:27:57.938364 kubelet[1425]: I0212 20:27:57.938278 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8da8ca9e-6c21-4439-9e14-0968e1d5a1c0-kube-proxy\") pod \"kube-proxy-gxppn\" (UID: \"8da8ca9e-6c21-4439-9e14-0968e1d5a1c0\") " pod="kube-system/kube-proxy-gxppn" Feb 12 20:27:57.938364 kubelet[1425]: I0212 20:27:57.938312 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r7sv4\" (UniqueName: \"kubernetes.io/projected/8da8ca9e-6c21-4439-9e14-0968e1d5a1c0-kube-api-access-r7sv4\") pod \"kube-proxy-gxppn\" (UID: \"8da8ca9e-6c21-4439-9e14-0968e1d5a1c0\") " pod="kube-system/kube-proxy-gxppn" Feb 12 20:27:57.938364 kubelet[1425]: I0212 20:27:57.938347 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-cni-bin-dir\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.938460 kubelet[1425]: I0212 20:27:57.938400 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-xtables-lock\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.938460 kubelet[1425]: I0212 20:27:57.938428 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-crk4x\" (UniqueName: \"kubernetes.io/projected/93bb6681-d659-4b2d-9ec7-7c679e51dd3a-kube-api-access-crk4x\") pod \"calico-node-4nkpg\" (UID: \"93bb6681-d659-4b2d-9ec7-7c679e51dd3a\") " pod="calico-system/calico-node-4nkpg" Feb 12 20:27:57.938528 kubelet[1425]: I0212 20:27:57.938467 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/db2a6781-a9c3-49b8-96ef-9701953605c5-kubelet-dir\") pod \"csi-node-driver-2fgql\" (UID: \"db2a6781-a9c3-49b8-96ef-9701953605c5\") " pod="calico-system/csi-node-driver-2fgql" Feb 12 20:27:57.938562 kubelet[1425]: I0212 20:27:57.938546 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/db2a6781-a9c3-49b8-96ef-9701953605c5-socket-dir\") pod \"csi-node-driver-2fgql\" (UID: \"db2a6781-a9c3-49b8-96ef-9701953605c5\") " pod="calico-system/csi-node-driver-2fgql" Feb 12 20:27:57.938601 kubelet[1425]: I0212 20:27:57.938582 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nkvcz\" (UniqueName: \"kubernetes.io/projected/db2a6781-a9c3-49b8-96ef-9701953605c5-kube-api-access-nkvcz\") pod \"csi-node-driver-2fgql\" (UID: \"db2a6781-a9c3-49b8-96ef-9701953605c5\") " pod="calico-system/csi-node-driver-2fgql" Feb 12 20:27:57.938635 kubelet[1425]: I0212 20:27:57.938622 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8da8ca9e-6c21-4439-9e14-0968e1d5a1c0-xtables-lock\") pod \"kube-proxy-gxppn\" (UID: \"8da8ca9e-6c21-4439-9e14-0968e1d5a1c0\") " pod="kube-system/kube-proxy-gxppn" Feb 12 20:27:58.039786 kubelet[1425]: E0212 20:27:58.039751 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.039786 kubelet[1425]: W0212 20:27:58.039775 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.039786 kubelet[1425]: E0212 20:27:58.039801 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.039985 kubelet[1425]: E0212 20:27:58.039957 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.039985 kubelet[1425]: W0212 20:27:58.039965 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.039985 kubelet[1425]: E0212 20:27:58.039982 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.040149 kubelet[1425]: E0212 20:27:58.040135 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.040149 kubelet[1425]: W0212 20:27:58.040146 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.040224 kubelet[1425]: E0212 20:27:58.040160 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.040342 kubelet[1425]: E0212 20:27:58.040326 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.040342 kubelet[1425]: W0212 20:27:58.040339 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.040422 kubelet[1425]: E0212 20:27:58.040355 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.040607 kubelet[1425]: E0212 20:27:58.040592 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.040607 kubelet[1425]: W0212 20:27:58.040603 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.040719 kubelet[1425]: E0212 20:27:58.040618 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.040791 kubelet[1425]: E0212 20:27:58.040778 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.040791 kubelet[1425]: W0212 20:27:58.040786 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.040895 kubelet[1425]: E0212 20:27:58.040814 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.040935 kubelet[1425]: E0212 20:27:58.040897 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.040935 kubelet[1425]: W0212 20:27:58.040904 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.040935 kubelet[1425]: E0212 20:27:58.040925 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.041076 kubelet[1425]: E0212 20:27:58.041055 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.041076 kubelet[1425]: W0212 20:27:58.041073 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.041155 kubelet[1425]: E0212 20:27:58.041092 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.041240 kubelet[1425]: E0212 20:27:58.041228 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.041240 kubelet[1425]: W0212 20:27:58.041240 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.041304 kubelet[1425]: E0212 20:27:58.041267 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.041409 kubelet[1425]: E0212 20:27:58.041398 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.041409 kubelet[1425]: W0212 20:27:58.041408 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.042055 kubelet[1425]: E0212 20:27:58.041431 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.042198 kubelet[1425]: E0212 20:27:58.042188 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.042267 kubelet[1425]: W0212 20:27:58.042251 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.042388 kubelet[1425]: E0212 20:27:58.042378 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.042547 kubelet[1425]: E0212 20:27:58.042535 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.042547 kubelet[1425]: W0212 20:27:58.042546 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.042636 kubelet[1425]: E0212 20:27:58.042625 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.042758 kubelet[1425]: E0212 20:27:58.042744 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.042758 kubelet[1425]: W0212 20:27:58.042756 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.042877 kubelet[1425]: E0212 20:27:58.042862 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.042877 kubelet[1425]: W0212 20:27:58.042871 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.042977 kubelet[1425]: E0212 20:27:58.042959 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.042977 kubelet[1425]: W0212 20:27:58.042970 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.043105 kubelet[1425]: E0212 20:27:58.043088 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.043260 kubelet[1425]: E0212 20:27:58.043091 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.043323 kubelet[1425]: W0212 20:27:58.043260 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.043351 kubelet[1425]: E0212 20:27:58.043179 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.043351 kubelet[1425]: E0212 20:27:58.043204 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.043400 kubelet[1425]: E0212 20:27:58.043366 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.043491 kubelet[1425]: E0212 20:27:58.043475 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.043491 kubelet[1425]: W0212 20:27:58.043486 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.043577 kubelet[1425]: E0212 20:27:58.043542 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.043627 kubelet[1425]: E0212 20:27:58.043611 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.043627 kubelet[1425]: W0212 20:27:58.043620 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.043728 kubelet[1425]: E0212 20:27:58.043669 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.043767 kubelet[1425]: E0212 20:27:58.043730 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.043767 kubelet[1425]: W0212 20:27:58.043735 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.043823 kubelet[1425]: E0212 20:27:58.043791 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.043879 kubelet[1425]: E0212 20:27:58.043864 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.043879 kubelet[1425]: W0212 20:27:58.043874 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.043977 kubelet[1425]: E0212 20:27:58.043884 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.044018 kubelet[1425]: E0212 20:27:58.044009 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.044018 kubelet[1425]: W0212 20:27:58.044015 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.044077 kubelet[1425]: E0212 20:27:58.044023 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.044165 kubelet[1425]: E0212 20:27:58.044155 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.044165 kubelet[1425]: W0212 20:27:58.044162 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.044263 kubelet[1425]: E0212 20:27:58.044170 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.044333 kubelet[1425]: E0212 20:27:58.044317 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.044333 kubelet[1425]: W0212 20:27:58.044330 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.044426 kubelet[1425]: E0212 20:27:58.044349 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.044552 kubelet[1425]: E0212 20:27:58.044538 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.044644 kubelet[1425]: W0212 20:27:58.044626 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.044712 kubelet[1425]: E0212 20:27:58.044652 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.044820 kubelet[1425]: E0212 20:27:58.044805 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.044820 kubelet[1425]: W0212 20:27:58.044815 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.044912 kubelet[1425]: E0212 20:27:58.044828 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.044966 kubelet[1425]: E0212 20:27:58.044956 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.044966 kubelet[1425]: W0212 20:27:58.044964 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.045057 kubelet[1425]: E0212 20:27:58.044974 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.045152 kubelet[1425]: E0212 20:27:58.045140 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.045152 kubelet[1425]: W0212 20:27:58.045147 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.045230 kubelet[1425]: E0212 20:27:58.045169 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.045297 kubelet[1425]: E0212 20:27:58.045277 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.045297 kubelet[1425]: W0212 20:27:58.045286 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.045411 kubelet[1425]: E0212 20:27:58.045383 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.045411 kubelet[1425]: W0212 20:27:58.045388 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.045478 kubelet[1425]: E0212 20:27:58.045414 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.045478 kubelet[1425]: E0212 20:27:58.045428 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.045555 kubelet[1425]: E0212 20:27:58.045525 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.045555 kubelet[1425]: W0212 20:27:58.045532 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.045624 kubelet[1425]: E0212 20:27:58.045560 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.045653 kubelet[1425]: E0212 20:27:58.045649 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.045682 kubelet[1425]: W0212 20:27:58.045655 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.045682 kubelet[1425]: E0212 20:27:58.045677 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.045775 kubelet[1425]: E0212 20:27:58.045762 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.045775 kubelet[1425]: W0212 20:27:58.045771 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.045884 kubelet[1425]: E0212 20:27:58.045810 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.045919 kubelet[1425]: E0212 20:27:58.045909 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.045950 kubelet[1425]: W0212 20:27:58.045919 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.045950 kubelet[1425]: E0212 20:27:58.045943 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.046070 kubelet[1425]: E0212 20:27:58.046061 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.046070 kubelet[1425]: W0212 20:27:58.046069 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.046174 kubelet[1425]: E0212 20:27:58.046091 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.046205 kubelet[1425]: E0212 20:27:58.046178 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.046205 kubelet[1425]: W0212 20:27:58.046184 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.046263 kubelet[1425]: E0212 20:27:58.046206 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.046293 kubelet[1425]: E0212 20:27:58.046288 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.046326 kubelet[1425]: W0212 20:27:58.046293 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.046326 kubelet[1425]: E0212 20:27:58.046317 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.046416 kubelet[1425]: E0212 20:27:58.046406 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.046416 kubelet[1425]: W0212 20:27:58.046415 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.046475 kubelet[1425]: E0212 20:27:58.046429 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.046542 kubelet[1425]: E0212 20:27:58.046532 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.046542 kubelet[1425]: W0212 20:27:58.046541 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.046604 kubelet[1425]: E0212 20:27:58.046563 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.046666 kubelet[1425]: E0212 20:27:58.046657 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.046666 kubelet[1425]: W0212 20:27:58.046665 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.046727 kubelet[1425]: E0212 20:27:58.046687 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.046813 kubelet[1425]: E0212 20:27:58.046793 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.046813 kubelet[1425]: W0212 20:27:58.046809 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.046881 kubelet[1425]: E0212 20:27:58.046824 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.047032 kubelet[1425]: E0212 20:27:58.047006 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.047032 kubelet[1425]: W0212 20:27:58.047023 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.047099 kubelet[1425]: E0212 20:27:58.047052 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.047158 kubelet[1425]: E0212 20:27:58.047148 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.047158 kubelet[1425]: W0212 20:27:58.047156 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.047215 kubelet[1425]: E0212 20:27:58.047178 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.047302 kubelet[1425]: E0212 20:27:58.047293 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.047302 kubelet[1425]: W0212 20:27:58.047301 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.047361 kubelet[1425]: E0212 20:27:58.047330 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.047425 kubelet[1425]: E0212 20:27:58.047416 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.047425 kubelet[1425]: W0212 20:27:58.047424 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.047488 kubelet[1425]: E0212 20:27:58.047441 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.047539 kubelet[1425]: E0212 20:27:58.047530 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.047569 kubelet[1425]: W0212 20:27:58.047539 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.047569 kubelet[1425]: E0212 20:27:58.047556 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.047659 kubelet[1425]: E0212 20:27:58.047650 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.047659 kubelet[1425]: W0212 20:27:58.047658 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.047718 kubelet[1425]: E0212 20:27:58.047674 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.047794 kubelet[1425]: E0212 20:27:58.047781 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.047794 kubelet[1425]: W0212 20:27:58.047789 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.047887 kubelet[1425]: E0212 20:27:58.047806 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.047922 kubelet[1425]: E0212 20:27:58.047906 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.047922 kubelet[1425]: W0212 20:27:58.047913 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.047975 kubelet[1425]: E0212 20:27:58.047926 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.048154 kubelet[1425]: E0212 20:27:58.048143 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.048154 kubelet[1425]: W0212 20:27:58.048152 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.048217 kubelet[1425]: E0212 20:27:58.048163 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.048292 kubelet[1425]: E0212 20:27:58.048286 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.048292 kubelet[1425]: W0212 20:27:58.048291 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.048353 kubelet[1425]: E0212 20:27:58.048302 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.048475 kubelet[1425]: E0212 20:27:58.048462 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.048475 kubelet[1425]: W0212 20:27:58.048474 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.048549 kubelet[1425]: E0212 20:27:58.048491 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.048690 kubelet[1425]: E0212 20:27:58.048674 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.048690 kubelet[1425]: W0212 20:27:58.048685 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.048735 kubelet[1425]: E0212 20:27:58.048700 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.048870 kubelet[1425]: E0212 20:27:58.048860 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.048897 kubelet[1425]: W0212 20:27:58.048870 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.048897 kubelet[1425]: E0212 20:27:58.048881 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.058650 kubelet[1425]: E0212 20:27:58.058626 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.058650 kubelet[1425]: W0212 20:27:58.058644 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.058752 kubelet[1425]: E0212 20:27:58.058661 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.059606 kubelet[1425]: E0212 20:27:58.059596 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.059683 kubelet[1425]: W0212 20:27:58.059667 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.059756 kubelet[1425]: E0212 20:27:58.059742 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.061157 kubelet[1425]: E0212 20:27:58.061143 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:27:58.061157 kubelet[1425]: W0212 20:27:58.061154 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:27:58.061241 kubelet[1425]: E0212 20:27:58.061163 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:27:58.141533 kubelet[1425]: E0212 20:27:58.141501 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:58.142223 env[1112]: time="2024-02-12T20:27:58.142180062Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4nkpg,Uid:93bb6681-d659-4b2d-9ec7-7c679e51dd3a,Namespace:calico-system,Attempt:0,}" Feb 12 20:27:58.144576 kubelet[1425]: E0212 20:27:58.144548 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:58.144910 env[1112]: time="2024-02-12T20:27:58.144852053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gxppn,Uid:8da8ca9e-6c21-4439-9e14-0968e1d5a1c0,Namespace:kube-system,Attempt:0,}" Feb 12 20:27:58.820206 kubelet[1425]: E0212 20:27:58.820153 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:58.993212 kubelet[1425]: E0212 20:27:58.993176 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:27:59.706623 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1823119097.mount: Deactivated successfully. Feb 12 20:27:59.713608 env[1112]: time="2024-02-12T20:27:59.713549897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.716081 env[1112]: time="2024-02-12T20:27:59.716043298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.716920 env[1112]: time="2024-02-12T20:27:59.716891700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.718538 env[1112]: time="2024-02-12T20:27:59.718510128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.719746 env[1112]: time="2024-02-12T20:27:59.719716548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.721205 env[1112]: time="2024-02-12T20:27:59.721170664Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.722573 env[1112]: time="2024-02-12T20:27:59.722545837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.725524 env[1112]: time="2024-02-12T20:27:59.725493251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:59.743178 env[1112]: time="2024-02-12T20:27:59.743102486Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:59.743178 env[1112]: time="2024-02-12T20:27:59.743145415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:59.743178 env[1112]: time="2024-02-12T20:27:59.743161782Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:59.743382 env[1112]: time="2024-02-12T20:27:59.743311053Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4 pid=1537 runtime=io.containerd.runc.v2 Feb 12 20:27:59.751422 env[1112]: time="2024-02-12T20:27:59.751329102Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:59.751422 env[1112]: time="2024-02-12T20:27:59.751410998Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:59.751422 env[1112]: time="2024-02-12T20:27:59.751428842Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:59.751706 env[1112]: time="2024-02-12T20:27:59.751659967Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/045d8aa0cda97f4bc0b5e6aa82f1d26595878c2f4eb896d1f418e258f926fae7 pid=1558 runtime=io.containerd.runc.v2 Feb 12 20:27:59.755969 systemd[1]: Started cri-containerd-a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4.scope. Feb 12 20:27:59.767534 systemd[1]: Started cri-containerd-045d8aa0cda97f4bc0b5e6aa82f1d26595878c2f4eb896d1f418e258f926fae7.scope. Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.770143 kernel: kauditd_printk_skb: 416 callbacks suppressed Feb 12 20:27:59.770183 kernel: audit: type=1400 audit(1707769679.768:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.779291 kernel: audit: type=1400 audit(1707769679.768:556): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.779343 kernel: audit: type=1400 audit(1707769679.768:557): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.779370 kernel: audit: type=1400 audit(1707769679.768:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.779389 kernel: audit: type=1400 audit(1707769679.768:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784039 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:27:59.784091 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 20:27:59.784112 kernel: audit: audit_backlog=66 > audit_backlog_limit=64 Feb 12 20:27:59.784131 kernel: audit: backlog limit exceeded Feb 12 20:27:59.784165 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.771000 audit: BPF prog-id=64 op=LOAD Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.775000 audit: BPF prog-id=65 op=LOAD Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1558 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034356438616130636461393766346263306235653661613832663164 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=1558 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034356438616130636461393766346263306235653661613832663164 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.776000 audit: BPF prog-id=66 op=LOAD Feb 12 20:27:59.776000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003c0cf0 items=0 ppid=1558 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034356438616130636461393766346263306235653661613832663164 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1537 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313361636130623336626631343466363338363634643031323562 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1537 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313361636130623336626631343466363338363634643031323562 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4ab0 items=0 ppid=1537 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313361636130623336626631343466363338363634643031323562 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit: BPF prog-id=69 op=LOAD Feb 12 20:27:59.783000 audit[1545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4af8 items=0 ppid=1537 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313361636130623336626631343466363338363634643031323562 Feb 12 20:27:59.783000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:27:59.783000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { perfmon } for pid=1545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.778000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003c0d38 items=0 ppid=1558 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034356438616130636461393766346263306235653661613832663164 Feb 12 20:27:59.784000 audit: BPF prog-id=68 op=UNLOAD Feb 12 20:27:59.784000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:27:59.783000 audit[1545]: AVC avc: denied { bpf } for pid=1545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.783000 audit: BPF prog-id=70 op=LOAD Feb 12 20:27:59.783000 audit[1545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d4f08 items=0 ppid=1537 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139313361636130623336626631343466363338363634643031323562 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { perfmon } for pid=1571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit[1571]: AVC avc: denied { bpf } for pid=1571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:59.784000 audit: BPF prog-id=71 op=LOAD Feb 12 20:27:59.784000 audit[1571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003c1148 items=0 ppid=1558 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:59.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034356438616130636461393766346263306235653661613832663164 Feb 12 20:27:59.797813 env[1112]: time="2024-02-12T20:27:59.797767627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gxppn,Uid:8da8ca9e-6c21-4439-9e14-0968e1d5a1c0,Namespace:kube-system,Attempt:0,} returns sandbox id \"045d8aa0cda97f4bc0b5e6aa82f1d26595878c2f4eb896d1f418e258f926fae7\"" Feb 12 20:27:59.798598 kubelet[1425]: E0212 20:27:59.798570 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:59.799235 env[1112]: time="2024-02-12T20:27:59.799184914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4nkpg,Uid:93bb6681-d659-4b2d-9ec7-7c679e51dd3a,Namespace:calico-system,Attempt:0,} returns sandbox id \"a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4\"" Feb 12 20:27:59.800049 env[1112]: time="2024-02-12T20:27:59.800004716Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 20:27:59.800436 kubelet[1425]: E0212 20:27:59.800406 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:27:59.821009 kubelet[1425]: E0212 20:27:59.820959 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:00.821342 kubelet[1425]: E0212 20:28:00.821313 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:00.831612 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1147146531.mount: Deactivated successfully. Feb 12 20:28:00.993217 kubelet[1425]: E0212 20:28:00.993171 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:28:01.367514 env[1112]: time="2024-02-12T20:28:01.367463908Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:01.369196 env[1112]: time="2024-02-12T20:28:01.369171574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:01.370535 env[1112]: time="2024-02-12T20:28:01.370501090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:01.371951 env[1112]: time="2024-02-12T20:28:01.371928890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:01.372322 env[1112]: time="2024-02-12T20:28:01.372301277Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 12 20:28:01.372937 env[1112]: time="2024-02-12T20:28:01.372917695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:28:01.373780 env[1112]: time="2024-02-12T20:28:01.373760651Z" level=info msg="CreateContainer within sandbox \"045d8aa0cda97f4bc0b5e6aa82f1d26595878c2f4eb896d1f418e258f926fae7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:28:01.387835 env[1112]: time="2024-02-12T20:28:01.387798747Z" level=info msg="CreateContainer within sandbox \"045d8aa0cda97f4bc0b5e6aa82f1d26595878c2f4eb896d1f418e258f926fae7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8fd7e14b5be35ea534ac7262614995b014914b49402c70b8a4424c42709a73e9\"" Feb 12 20:28:01.388280 env[1112]: time="2024-02-12T20:28:01.388260997Z" level=info msg="StartContainer for \"8fd7e14b5be35ea534ac7262614995b014914b49402c70b8a4424c42709a73e9\"" Feb 12 20:28:01.402589 systemd[1]: Started cri-containerd-8fd7e14b5be35ea534ac7262614995b014914b49402c70b8a4424c42709a73e9.scope. Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019d6b0 a2=3c a3=7fb730196018 items=0 ppid=1558 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643765313462356265333565613533346163373236323631343939 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit: BPF prog-id=72 op=LOAD Feb 12 20:28:01.413000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019d9d8 a2=78 a3=c0001891a8 items=0 ppid=1558 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643765313462356265333565613533346163373236323631343939 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit: BPF prog-id=73 op=LOAD Feb 12 20:28:01.413000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019d770 a2=78 a3=c0001891f8 items=0 ppid=1558 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643765313462356265333565613533346163373236323631343939 Feb 12 20:28:01.413000 audit: BPF prog-id=73 op=UNLOAD Feb 12 20:28:01.413000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { perfmon } for pid=1616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit[1616]: AVC avc: denied { bpf } for pid=1616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:01.413000 audit: BPF prog-id=74 op=LOAD Feb 12 20:28:01.413000 audit[1616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019dc30 a2=78 a3=c000189288 items=0 ppid=1558 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866643765313462356265333565613533346163373236323631343939 Feb 12 20:28:01.424233 env[1112]: time="2024-02-12T20:28:01.424187522Z" level=info msg="StartContainer for \"8fd7e14b5be35ea534ac7262614995b014914b49402c70b8a4424c42709a73e9\" returns successfully" Feb 12 20:28:01.466000 audit[1670]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.466000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0ab15780 a2=0 a3=7ffc0ab1576c items=0 ppid=1627 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:28:01.466000 audit[1671]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.466000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8ffc2780 a2=0 a3=31030 items=0 ppid=1627 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:28:01.467000 audit[1672]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.467000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcda59d680 a2=0 a3=7ffcda59d66c items=0 ppid=1627 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:28:01.467000 audit[1673]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.467000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef31ba010 a2=0 a3=7ffef31b9ffc items=0 ppid=1627 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:28:01.467000 audit[1674]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.467000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff90b08df0 a2=0 a3=7fff90b08ddc items=0 ppid=1627 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:28:01.467000 audit[1675]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.467000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6e16a940 a2=0 a3=7ffd6e16a92c items=0 ppid=1627 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:28:01.568000 audit[1676]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.568000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd21eda2f0 a2=0 a3=7ffd21eda2dc items=0 ppid=1627 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:28:01.570000 audit[1678]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.570000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffcdcf6e60 a2=0 a3=7fffcdcf6e4c items=0 ppid=1627 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:28:01.573000 audit[1681]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.573000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc790948e0 a2=0 a3=7ffc790948cc items=0 ppid=1627 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:28:01.573000 audit[1682]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.573000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0bf9ed80 a2=0 a3=7fff0bf9ed6c items=0 ppid=1627 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:28:01.575000 audit[1684]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.575000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd276bf120 a2=0 a3=7ffd276bf10c items=0 ppid=1627 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:28:01.576000 audit[1685]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.576000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec50d02a0 a2=0 a3=7ffec50d028c items=0 ppid=1627 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:28:01.578000 audit[1687]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.578000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd15ce9470 a2=0 a3=7ffd15ce945c items=0 ppid=1627 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:28:01.580000 audit[1690]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.580000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff5b283bc0 a2=0 a3=7fff5b283bac items=0 ppid=1627 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:28:01.582000 audit[1691]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.582000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8f777280 a2=0 a3=7ffe8f77726c items=0 ppid=1627 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:28:01.583000 audit[1693]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.583000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff50ec6570 a2=0 a3=7fff50ec655c items=0 ppid=1627 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:28:01.584000 audit[1694]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.584000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd92236210 a2=0 a3=7ffd922361fc items=0 ppid=1627 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:28:01.585000 audit[1696]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.585000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9e7c3960 a2=0 a3=7fff9e7c394c items=0 ppid=1627 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:28:01.588000 audit[1699]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.588000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc45692f30 a2=0 a3=7ffc45692f1c items=0 ppid=1627 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.588000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:28:01.590000 audit[1702]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.590000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed4eba600 a2=0 a3=7ffed4eba5ec items=0 ppid=1627 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:28:01.591000 audit[1703]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.591000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda02ccab0 a2=0 a3=7ffda02cca9c items=0 ppid=1627 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:28:01.593000 audit[1705]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.593000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd8a423760 a2=0 a3=7ffd8a42374c items=0 ppid=1627 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:28:01.611000 audit[1710]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.611000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc36df35c0 a2=0 a3=7ffc36df35ac items=0 ppid=1627 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:28:01.612000 audit[1711]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.612000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5b1aada0 a2=0 a3=7ffd5b1aad8c items=0 ppid=1627 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:28:01.613000 audit[1713]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:28:01.613000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd88849df0 a2=0 a3=7ffd88849ddc items=0 ppid=1627 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:28:01.623000 audit[1719]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:01.623000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd98483970 a2=0 a3=7ffd9848395c items=0 ppid=1627 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:01.637000 audit[1719]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:01.637000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd98483970 a2=0 a3=7ffd9848395c items=0 ppid=1627 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:01.638000 audit[1725]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.638000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdff8bd6f0 a2=0 a3=7ffdff8bd6dc items=0 ppid=1627 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:28:01.640000 audit[1727]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.640000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeda83d4b0 a2=0 a3=7ffeda83d49c items=0 ppid=1627 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:28:01.642000 audit[1730]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.642000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd94988fc0 a2=0 a3=7ffd94988fac items=0 ppid=1627 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:28:01.643000 audit[1731]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.643000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc50fd3750 a2=0 a3=7ffc50fd373c items=0 ppid=1627 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:28:01.645000 audit[1733]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.645000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1851d4b0 a2=0 a3=7ffc1851d49c items=0 ppid=1627 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:28:01.645000 audit[1734]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.645000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff88190270 a2=0 a3=7fff8819025c items=0 ppid=1627 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:28:01.647000 audit[1736]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.647000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd6c3ab8d0 a2=0 a3=7ffd6c3ab8bc items=0 ppid=1627 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:28:01.650000 audit[1739]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.650000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff453fafb0 a2=0 a3=7fff453faf9c items=0 ppid=1627 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:28:01.650000 audit[1740]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.650000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc3a0e090 a2=0 a3=7ffdc3a0e07c items=0 ppid=1627 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:28:01.652000 audit[1742]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.652000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcdb7a5ed0 a2=0 a3=7ffcdb7a5ebc items=0 ppid=1627 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:28:01.653000 audit[1743]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.653000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde694b6e0 a2=0 a3=7ffde694b6cc items=0 ppid=1627 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:28:01.654000 audit[1745]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.654000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed77ffe90 a2=0 a3=7ffed77ffe7c items=0 ppid=1627 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:28:01.657000 audit[1748]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.657000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8c71e2d0 a2=0 a3=7ffe8c71e2bc items=0 ppid=1627 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:28:01.659000 audit[1751]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.659000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe261706a0 a2=0 a3=7ffe2617068c items=0 ppid=1627 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:28:01.660000 audit[1752]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.660000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc60312550 a2=0 a3=7ffc6031253c items=0 ppid=1627 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:28:01.662000 audit[1754]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.662000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc1396e0d0 a2=0 a3=7ffc1396e0bc items=0 ppid=1627 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:28:01.664000 audit[1757]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.664000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeb205abc0 a2=0 a3=7ffeb205abac items=0 ppid=1627 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:28:01.664000 audit[1758]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.664000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe254b5560 a2=0 a3=7ffe254b554c items=0 ppid=1627 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:28:01.666000 audit[1760]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.666000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd92ed49f0 a2=0 a3=7ffd92ed49dc items=0 ppid=1627 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:28:01.667000 audit[1761]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.667000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0a87d0c0 a2=0 a3=7ffe0a87d0ac items=0 ppid=1627 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:28:01.668000 audit[1763]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.668000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc97a0d60 a2=0 a3=7fffc97a0d4c items=0 ppid=1627 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:28:01.671000 audit[1766]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:28:01.671000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc14e423f0 a2=0 a3=7ffc14e423dc items=0 ppid=1627 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:28:01.673000 audit[1768]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:28:01.673000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd6fc47090 a2=0 a3=7ffd6fc4707c items=0 ppid=1627 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.673000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:01.673000 audit[1768]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:28:01.673000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd6fc47090 a2=0 a3=7ffd6fc4707c items=0 ppid=1627 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:01.673000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:01.822044 kubelet[1425]: E0212 20:28:01.822011 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:02.004853 kubelet[1425]: E0212 20:28:02.004760 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:02.010618 kubelet[1425]: I0212 20:28:02.010589 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-gxppn" podStartSLOduration=4.437263819 podCreationTimestamp="2024-02-12 20:27:56 +0000 UTC" firstStartedPulling="2024-02-12 20:27:59.799378916 +0000 UTC m=+5.304664571" lastFinishedPulling="2024-02-12 20:28:01.372671787 +0000 UTC m=+6.877957442" observedRunningTime="2024-02-12 20:28:02.010225974 +0000 UTC m=+7.515511630" watchObservedRunningTime="2024-02-12 20:28:02.01055669 +0000 UTC m=+7.515842345" Feb 12 20:28:02.049872 kubelet[1425]: E0212 20:28:02.049841 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.049872 kubelet[1425]: W0212 20:28:02.049863 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.050107 kubelet[1425]: E0212 20:28:02.049888 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.050107 kubelet[1425]: E0212 20:28:02.050091 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.050107 kubelet[1425]: W0212 20:28:02.050103 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.050208 kubelet[1425]: E0212 20:28:02.050127 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.050304 kubelet[1425]: E0212 20:28:02.050291 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.050304 kubelet[1425]: W0212 20:28:02.050302 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.050365 kubelet[1425]: E0212 20:28:02.050321 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.050494 kubelet[1425]: E0212 20:28:02.050478 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.050494 kubelet[1425]: W0212 20:28:02.050489 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.050554 kubelet[1425]: E0212 20:28:02.050500 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.050651 kubelet[1425]: E0212 20:28:02.050641 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.050651 kubelet[1425]: W0212 20:28:02.050650 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.050721 kubelet[1425]: E0212 20:28:02.050661 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.050798 kubelet[1425]: E0212 20:28:02.050789 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.050833 kubelet[1425]: W0212 20:28:02.050798 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.050833 kubelet[1425]: E0212 20:28:02.050808 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.051058 kubelet[1425]: E0212 20:28:02.050960 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.051058 kubelet[1425]: W0212 20:28:02.050973 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.051058 kubelet[1425]: E0212 20:28:02.050985 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.051318 kubelet[1425]: E0212 20:28:02.051147 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.051318 kubelet[1425]: W0212 20:28:02.051156 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.051318 kubelet[1425]: E0212 20:28:02.051175 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.051386 kubelet[1425]: E0212 20:28:02.051339 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.051386 kubelet[1425]: W0212 20:28:02.051348 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.051386 kubelet[1425]: E0212 20:28:02.051359 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.051513 kubelet[1425]: E0212 20:28:02.051497 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.051513 kubelet[1425]: W0212 20:28:02.051507 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.051581 kubelet[1425]: E0212 20:28:02.051518 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.051656 kubelet[1425]: E0212 20:28:02.051643 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.051656 kubelet[1425]: W0212 20:28:02.051653 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.051709 kubelet[1425]: E0212 20:28:02.051666 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.051807 kubelet[1425]: E0212 20:28:02.051795 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.051807 kubelet[1425]: W0212 20:28:02.051806 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.051856 kubelet[1425]: E0212 20:28:02.051820 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.051964 kubelet[1425]: E0212 20:28:02.051953 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.051964 kubelet[1425]: W0212 20:28:02.051963 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.052039 kubelet[1425]: E0212 20:28:02.051974 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.052126 kubelet[1425]: E0212 20:28:02.052115 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.052164 kubelet[1425]: W0212 20:28:02.052127 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.052164 kubelet[1425]: E0212 20:28:02.052145 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.052304 kubelet[1425]: E0212 20:28:02.052288 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.052304 kubelet[1425]: W0212 20:28:02.052299 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.052369 kubelet[1425]: E0212 20:28:02.052310 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.052456 kubelet[1425]: E0212 20:28:02.052442 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.052456 kubelet[1425]: W0212 20:28:02.052453 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.052508 kubelet[1425]: E0212 20:28:02.052463 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.052618 kubelet[1425]: E0212 20:28:02.052603 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.052618 kubelet[1425]: W0212 20:28:02.052614 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.052688 kubelet[1425]: E0212 20:28:02.052625 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.052763 kubelet[1425]: E0212 20:28:02.052750 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.052763 kubelet[1425]: W0212 20:28:02.052760 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.052811 kubelet[1425]: E0212 20:28:02.052771 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.052904 kubelet[1425]: E0212 20:28:02.052892 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.052904 kubelet[1425]: W0212 20:28:02.052902 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.052948 kubelet[1425]: E0212 20:28:02.052913 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.053083 kubelet[1425]: E0212 20:28:02.053071 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.053083 kubelet[1425]: W0212 20:28:02.053082 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.053136 kubelet[1425]: E0212 20:28:02.053094 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.069858 kubelet[1425]: E0212 20:28:02.069823 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.069858 kubelet[1425]: W0212 20:28:02.069845 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.069920 kubelet[1425]: E0212 20:28:02.069863 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.070129 kubelet[1425]: E0212 20:28:02.070115 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.070129 kubelet[1425]: W0212 20:28:02.070124 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.070203 kubelet[1425]: E0212 20:28:02.070138 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.070500 kubelet[1425]: E0212 20:28:02.070460 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.070500 kubelet[1425]: W0212 20:28:02.070489 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.070568 kubelet[1425]: E0212 20:28:02.070523 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.070747 kubelet[1425]: E0212 20:28:02.070722 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.070747 kubelet[1425]: W0212 20:28:02.070732 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.070747 kubelet[1425]: E0212 20:28:02.070744 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.070945 kubelet[1425]: E0212 20:28:02.070878 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.070945 kubelet[1425]: W0212 20:28:02.070885 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.070945 kubelet[1425]: E0212 20:28:02.070897 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.071064 kubelet[1425]: E0212 20:28:02.071051 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.071064 kubelet[1425]: W0212 20:28:02.071060 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.071126 kubelet[1425]: E0212 20:28:02.071078 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.071419 kubelet[1425]: E0212 20:28:02.071390 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.071419 kubelet[1425]: W0212 20:28:02.071412 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.071489 kubelet[1425]: E0212 20:28:02.071444 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.071639 kubelet[1425]: E0212 20:28:02.071619 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.071639 kubelet[1425]: W0212 20:28:02.071628 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.071639 kubelet[1425]: E0212 20:28:02.071644 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.071805 kubelet[1425]: E0212 20:28:02.071783 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.071805 kubelet[1425]: W0212 20:28:02.071795 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.071853 kubelet[1425]: E0212 20:28:02.071809 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.071950 kubelet[1425]: E0212 20:28:02.071935 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.071950 kubelet[1425]: W0212 20:28:02.071946 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.072022 kubelet[1425]: E0212 20:28:02.071953 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.072105 kubelet[1425]: E0212 20:28:02.072094 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.072105 kubelet[1425]: W0212 20:28:02.072103 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.072150 kubelet[1425]: E0212 20:28:02.072111 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.072381 kubelet[1425]: E0212 20:28:02.072364 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:02.072381 kubelet[1425]: W0212 20:28:02.072374 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:02.072381 kubelet[1425]: E0212 20:28:02.072382 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:02.822884 kubelet[1425]: E0212 20:28:02.822820 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:02.993479 kubelet[1425]: E0212 20:28:02.993422 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:28:03.006530 kubelet[1425]: E0212 20:28:03.006500 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:03.060554 kubelet[1425]: E0212 20:28:03.060508 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.060554 kubelet[1425]: W0212 20:28:03.060533 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.060554 kubelet[1425]: E0212 20:28:03.060554 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.060841 kubelet[1425]: E0212 20:28:03.060737 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.060841 kubelet[1425]: W0212 20:28:03.060742 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.060841 kubelet[1425]: E0212 20:28:03.060753 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.060938 kubelet[1425]: E0212 20:28:03.060891 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.060938 kubelet[1425]: W0212 20:28:03.060897 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.060938 kubelet[1425]: E0212 20:28:03.060905 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.061082 kubelet[1425]: E0212 20:28:03.061059 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.061082 kubelet[1425]: W0212 20:28:03.061066 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.061082 kubelet[1425]: E0212 20:28:03.061075 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.061279 kubelet[1425]: E0212 20:28:03.061243 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.061279 kubelet[1425]: W0212 20:28:03.061255 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.061279 kubelet[1425]: E0212 20:28:03.061263 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.061518 kubelet[1425]: E0212 20:28:03.061393 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.061518 kubelet[1425]: W0212 20:28:03.061398 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.061518 kubelet[1425]: E0212 20:28:03.061406 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.061585 kubelet[1425]: E0212 20:28:03.061528 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.061585 kubelet[1425]: W0212 20:28:03.061533 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.061585 kubelet[1425]: E0212 20:28:03.061543 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.061668 kubelet[1425]: E0212 20:28:03.061660 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.061668 kubelet[1425]: W0212 20:28:03.061666 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.061711 kubelet[1425]: E0212 20:28:03.061674 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.061819 kubelet[1425]: E0212 20:28:03.061807 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.061819 kubelet[1425]: W0212 20:28:03.061815 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.061867 kubelet[1425]: E0212 20:28:03.061823 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.061973 kubelet[1425]: E0212 20:28:03.061961 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.061973 kubelet[1425]: W0212 20:28:03.061970 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.062030 kubelet[1425]: E0212 20:28:03.061980 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.062146 kubelet[1425]: E0212 20:28:03.062133 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.062146 kubelet[1425]: W0212 20:28:03.062142 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.062208 kubelet[1425]: E0212 20:28:03.062151 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.062511 kubelet[1425]: E0212 20:28:03.062441 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.062511 kubelet[1425]: W0212 20:28:03.062450 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.062511 kubelet[1425]: E0212 20:28:03.062458 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.062733 kubelet[1425]: E0212 20:28:03.062599 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.062733 kubelet[1425]: W0212 20:28:03.062605 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.062733 kubelet[1425]: E0212 20:28:03.062612 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.062819 kubelet[1425]: E0212 20:28:03.062745 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.062819 kubelet[1425]: W0212 20:28:03.062752 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.062819 kubelet[1425]: E0212 20:28:03.062760 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.062925 kubelet[1425]: E0212 20:28:03.062906 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.062925 kubelet[1425]: W0212 20:28:03.062917 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.062925 kubelet[1425]: E0212 20:28:03.062925 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.063092 kubelet[1425]: E0212 20:28:03.063076 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.063092 kubelet[1425]: W0212 20:28:03.063086 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.063148 kubelet[1425]: E0212 20:28:03.063095 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.063254 kubelet[1425]: E0212 20:28:03.063239 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.063254 kubelet[1425]: W0212 20:28:03.063249 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.063316 kubelet[1425]: E0212 20:28:03.063257 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.063400 kubelet[1425]: E0212 20:28:03.063386 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.063400 kubelet[1425]: W0212 20:28:03.063395 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.063400 kubelet[1425]: E0212 20:28:03.063402 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.063552 kubelet[1425]: E0212 20:28:03.063540 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.063552 kubelet[1425]: W0212 20:28:03.063551 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.063600 kubelet[1425]: E0212 20:28:03.063561 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.063722 kubelet[1425]: E0212 20:28:03.063703 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.063722 kubelet[1425]: W0212 20:28:03.063717 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.063767 kubelet[1425]: E0212 20:28:03.063729 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.075439 kubelet[1425]: E0212 20:28:03.075347 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.075439 kubelet[1425]: W0212 20:28:03.075369 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.075439 kubelet[1425]: E0212 20:28:03.075392 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.075628 kubelet[1425]: E0212 20:28:03.075613 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.075628 kubelet[1425]: W0212 20:28:03.075624 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.075684 kubelet[1425]: E0212 20:28:03.075634 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.075797 kubelet[1425]: E0212 20:28:03.075776 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.075848 kubelet[1425]: W0212 20:28:03.075788 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.075848 kubelet[1425]: E0212 20:28:03.075822 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.076129 kubelet[1425]: E0212 20:28:03.076119 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.076129 kubelet[1425]: W0212 20:28:03.076127 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.076201 kubelet[1425]: E0212 20:28:03.076148 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.076303 kubelet[1425]: E0212 20:28:03.076290 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.076303 kubelet[1425]: W0212 20:28:03.076300 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.076402 kubelet[1425]: E0212 20:28:03.076317 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.076501 kubelet[1425]: E0212 20:28:03.076476 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.076501 kubelet[1425]: W0212 20:28:03.076493 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.076572 kubelet[1425]: E0212 20:28:03.076510 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.076763 kubelet[1425]: E0212 20:28:03.076751 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.076763 kubelet[1425]: W0212 20:28:03.076761 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.076870 kubelet[1425]: E0212 20:28:03.076776 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.076942 kubelet[1425]: E0212 20:28:03.076926 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.076990 kubelet[1425]: W0212 20:28:03.076941 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.076990 kubelet[1425]: E0212 20:28:03.076956 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.077160 kubelet[1425]: E0212 20:28:03.077147 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.077160 kubelet[1425]: W0212 20:28:03.077158 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.077242 kubelet[1425]: E0212 20:28:03.077190 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.077449 kubelet[1425]: E0212 20:28:03.077428 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.077449 kubelet[1425]: W0212 20:28:03.077438 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.077449 kubelet[1425]: E0212 20:28:03.077456 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.077685 kubelet[1425]: E0212 20:28:03.077672 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.077685 kubelet[1425]: W0212 20:28:03.077682 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.077762 kubelet[1425]: E0212 20:28:03.077699 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.077872 kubelet[1425]: E0212 20:28:03.077860 1425 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:28:03.077872 kubelet[1425]: W0212 20:28:03.077869 1425 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:28:03.077943 kubelet[1425]: E0212 20:28:03.077878 1425 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:28:03.637291 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount705292272.mount: Deactivated successfully. Feb 12 20:28:03.823447 kubelet[1425]: E0212 20:28:03.823386 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:04.725306 env[1112]: time="2024-02-12T20:28:04.725240024Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:04.762832 env[1112]: time="2024-02-12T20:28:04.762770485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:04.772422 env[1112]: time="2024-02-12T20:28:04.772396893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:04.774718 env[1112]: time="2024-02-12T20:28:04.774679848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:04.775481 env[1112]: time="2024-02-12T20:28:04.775432160Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 20:28:04.778057 env[1112]: time="2024-02-12T20:28:04.778015383Z" level=info msg="CreateContainer within sandbox \"a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:28:04.792737 env[1112]: time="2024-02-12T20:28:04.792687942Z" level=info msg="CreateContainer within sandbox \"a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2c718ab8945dacd1f431491c883a2cda4012be933bd32e8401c2a18fbebbe269\"" Feb 12 20:28:04.793264 env[1112]: time="2024-02-12T20:28:04.793227050Z" level=info msg="StartContainer for \"2c718ab8945dacd1f431491c883a2cda4012be933bd32e8401c2a18fbebbe269\"" Feb 12 20:28:04.808611 systemd[1]: Started cri-containerd-2c718ab8945dacd1f431491c883a2cda4012be933bd32e8401c2a18fbebbe269.scope. Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.822253 kernel: kauditd_printk_skb: 304 callbacks suppressed Feb 12 20:28:04.822383 kernel: audit: type=1400 audit(1707769684.820:648): avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5b3bf772f8 items=0 ppid=1537 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.824506 kubelet[1425]: E0212 20:28:04.824483 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:04.827367 kernel: audit: type=1300 audit(1707769684.820:648): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5b3bf772f8 items=0 ppid=1537 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.827430 kernel: audit: type=1327 audit(1707769684.820:648): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263373138616238393435646163643166343331343931633838336132 Feb 12 20:28:04.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263373138616238393435646163643166343331343931633838336132 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.832333 kernel: audit: type=1400 audit(1707769684.820:649): avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.834443 kernel: audit: type=1400 audit(1707769684.820:649): avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.834483 kernel: audit: type=1400 audit(1707769684.820:649): avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.839004 kernel: audit: type=1400 audit(1707769684.820:649): avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.843522 kernel: audit: type=1400 audit(1707769684.820:649): avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.843558 kernel: audit: type=1400 audit(1707769684.820:649): avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.846590 kernel: audit: type=1400 audit(1707769684.820:649): avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.846667 env[1112]: time="2024-02-12T20:28:04.844920244Z" level=info msg="StartContainer for \"2c718ab8945dacd1f431491c883a2cda4012be933bd32e8401c2a18fbebbe269\" returns successfully" Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.820000 audit: BPF prog-id=75 op=LOAD Feb 12 20:28:04.820000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024ad8 items=0 ppid=1537 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263373138616238393435646163643166343331343931633838336132 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.823000 audit: BPF prog-id=76 op=LOAD Feb 12 20:28:04.823000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024b28 items=0 ppid=1537 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263373138616238393435646163643166343331343931633838336132 Feb 12 20:28:04.826000 audit: BPF prog-id=76 op=UNLOAD Feb 12 20:28:04.826000 audit: BPF prog-id=75 op=UNLOAD Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:04.826000 audit: BPF prog-id=77 op=LOAD Feb 12 20:28:04.826000 audit[1840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024bb8 items=0 ppid=1537 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:04.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263373138616238393435646163643166343331343931633838336132 Feb 12 20:28:04.853132 systemd[1]: cri-containerd-2c718ab8945dacd1f431491c883a2cda4012be933bd32e8401c2a18fbebbe269.scope: Deactivated successfully. Feb 12 20:28:04.857000 audit: BPF prog-id=77 op=UNLOAD Feb 12 20:28:04.869943 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2c718ab8945dacd1f431491c883a2cda4012be933bd32e8401c2a18fbebbe269-rootfs.mount: Deactivated successfully. Feb 12 20:28:04.993618 kubelet[1425]: E0212 20:28:04.993148 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:28:05.010560 kubelet[1425]: E0212 20:28:05.010533 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:05.303803 env[1112]: time="2024-02-12T20:28:05.303673048Z" level=info msg="shim disconnected" id=2c718ab8945dacd1f431491c883a2cda4012be933bd32e8401c2a18fbebbe269 Feb 12 20:28:05.303803 env[1112]: time="2024-02-12T20:28:05.303721465Z" level=warning msg="cleaning up after shim disconnected" id=2c718ab8945dacd1f431491c883a2cda4012be933bd32e8401c2a18fbebbe269 namespace=k8s.io Feb 12 20:28:05.303803 env[1112]: time="2024-02-12T20:28:05.303732255Z" level=info msg="cleaning up dead shim" Feb 12 20:28:05.310454 env[1112]: time="2024-02-12T20:28:05.310380602Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:28:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1885 runtime=io.containerd.runc.v2\n" Feb 12 20:28:05.825547 kubelet[1425]: E0212 20:28:05.825496 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:06.012341 kubelet[1425]: E0212 20:28:06.012309 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:06.013124 env[1112]: time="2024-02-12T20:28:06.013097309Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:28:06.826495 kubelet[1425]: E0212 20:28:06.826455 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:06.992932 kubelet[1425]: E0212 20:28:06.992896 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:28:07.458177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount232020972.mount: Deactivated successfully. Feb 12 20:28:07.826844 kubelet[1425]: E0212 20:28:07.826714 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:08.827072 kubelet[1425]: E0212 20:28:08.827005 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:08.993069 kubelet[1425]: E0212 20:28:08.992988 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:28:09.827463 kubelet[1425]: E0212 20:28:09.827411 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:10.828383 kubelet[1425]: E0212 20:28:10.828297 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:10.993124 kubelet[1425]: E0212 20:28:10.993075 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:28:11.355620 env[1112]: time="2024-02-12T20:28:11.355563746Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:11.379300 env[1112]: time="2024-02-12T20:28:11.379265002Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:11.400122 env[1112]: time="2024-02-12T20:28:11.400088450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:11.415795 env[1112]: time="2024-02-12T20:28:11.415768306Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:11.416374 env[1112]: time="2024-02-12T20:28:11.416347857Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 20:28:11.417923 env[1112]: time="2024-02-12T20:28:11.417897251Z" level=info msg="CreateContainer within sandbox \"a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:28:11.453736 env[1112]: time="2024-02-12T20:28:11.453687881Z" level=info msg="CreateContainer within sandbox \"a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5173db5225e1bef581d5917ff717b2e47059686e6c9c61f4d11378cf7896872c\"" Feb 12 20:28:11.454185 env[1112]: time="2024-02-12T20:28:11.454163100Z" level=info msg="StartContainer for \"5173db5225e1bef581d5917ff717b2e47059686e6c9c61f4d11378cf7896872c\"" Feb 12 20:28:11.468328 systemd[1]: Started cri-containerd-5173db5225e1bef581d5917ff717b2e47059686e6c9c61f4d11378cf7896872c.scope. Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.487046 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:28:11.487271 kernel: audit: type=1400 audit(1707769691.477:655): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.487300 kernel: audit: type=1300 audit(1707769691.477:655): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f056af80b58 items=0 ppid=1537 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:11.487319 kernel: audit: type=1327 audit(1707769691.477:655): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373364623532323565316265663538316435393137666637313762 Feb 12 20:28:11.487336 kernel: audit: type=1400 audit(1707769691.477:656): avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f056af80b58 items=0 ppid=1537 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:11.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373364623532323565316265663538316435393137666637313762 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.490844 kernel: audit: type=1400 audit(1707769691.477:656): avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.490887 kernel: audit: type=1400 audit(1707769691.477:656): avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.492819 kernel: audit: type=1400 audit(1707769691.477:656): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.496782 kernel: audit: type=1400 audit(1707769691.477:656): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.496837 kernel: audit: type=1400 audit(1707769691.477:656): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.477000 audit: BPF prog-id=78 op=LOAD Feb 12 20:28:11.477000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034bba8 items=0 ppid=1537 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:11.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373364623532323565316265663538316435393137666637313762 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.480000 audit: BPF prog-id=79 op=LOAD Feb 12 20:28:11.480000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034bbf8 items=0 ppid=1537 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:11.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373364623532323565316265663538316435393137666637313762 Feb 12 20:28:11.483000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:28:11.483000 audit: BPF prog-id=78 op=UNLOAD Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.502030 kernel: audit: type=1400 audit(1707769691.477:656): avc: denied { perfmon } for pid=1904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit[1904]: AVC avc: denied { bpf } for pid=1904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:11.483000 audit: BPF prog-id=80 op=LOAD Feb 12 20:28:11.483000 audit[1904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034bc88 items=0 ppid=1537 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:11.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531373364623532323565316265663538316435393137666637313762 Feb 12 20:28:11.502180 env[1112]: time="2024-02-12T20:28:11.501631565Z" level=info msg="StartContainer for \"5173db5225e1bef581d5917ff717b2e47059686e6c9c61f4d11378cf7896872c\" returns successfully" Feb 12 20:28:11.829510 kubelet[1425]: E0212 20:28:11.829448 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:12.021759 kubelet[1425]: E0212 20:28:12.021733 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:12.573443 systemd[1]: cri-containerd-5173db5225e1bef581d5917ff717b2e47059686e6c9c61f4d11378cf7896872c.scope: Deactivated successfully. Feb 12 20:28:12.577000 audit: BPF prog-id=80 op=UNLOAD Feb 12 20:28:12.583470 kubelet[1425]: I0212 20:28:12.583219 1425 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:28:12.590973 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5173db5225e1bef581d5917ff717b2e47059686e6c9c61f4d11378cf7896872c-rootfs.mount: Deactivated successfully. Feb 12 20:28:12.830446 kubelet[1425]: E0212 20:28:12.830310 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:12.996776 systemd[1]: Created slice kubepods-besteffort-poddb2a6781_a9c3_49b8_96ef_9701953605c5.slice. Feb 12 20:28:12.998568 env[1112]: time="2024-02-12T20:28:12.998529230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2fgql,Uid:db2a6781-a9c3-49b8-96ef-9701953605c5,Namespace:calico-system,Attempt:0,}" Feb 12 20:28:13.022911 kubelet[1425]: E0212 20:28:13.022878 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:13.123780 env[1112]: time="2024-02-12T20:28:13.123647540Z" level=info msg="shim disconnected" id=5173db5225e1bef581d5917ff717b2e47059686e6c9c61f4d11378cf7896872c Feb 12 20:28:13.123780 env[1112]: time="2024-02-12T20:28:13.123709112Z" level=warning msg="cleaning up after shim disconnected" id=5173db5225e1bef581d5917ff717b2e47059686e6c9c61f4d11378cf7896872c namespace=k8s.io Feb 12 20:28:13.123780 env[1112]: time="2024-02-12T20:28:13.123717670Z" level=info msg="cleaning up dead shim" Feb 12 20:28:13.129781 env[1112]: time="2024-02-12T20:28:13.129718339Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:28:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1951 runtime=io.containerd.runc.v2\n" Feb 12 20:28:13.180254 env[1112]: time="2024-02-12T20:28:13.180166686Z" level=error msg="Failed to destroy network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:13.180559 env[1112]: time="2024-02-12T20:28:13.180522791Z" level=error msg="encountered an error cleaning up failed sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:13.180617 env[1112]: time="2024-02-12T20:28:13.180568333Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2fgql,Uid:db2a6781-a9c3-49b8-96ef-9701953605c5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:13.180919 kubelet[1425]: E0212 20:28:13.180871 1425 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:13.181095 kubelet[1425]: E0212 20:28:13.180953 1425 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2fgql" Feb 12 20:28:13.181095 kubelet[1425]: E0212 20:28:13.180984 1425 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2fgql" Feb 12 20:28:13.181095 kubelet[1425]: E0212 20:28:13.181069 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2fgql_calico-system(db2a6781-a9c3-49b8-96ef-9701953605c5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2fgql_calico-system(db2a6781-a9c3-49b8-96ef-9701953605c5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:28:13.181626 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231-shm.mount: Deactivated successfully. Feb 12 20:28:13.831072 kubelet[1425]: E0212 20:28:13.831013 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:14.026606 kubelet[1425]: E0212 20:28:14.026576 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:14.027095 env[1112]: time="2024-02-12T20:28:14.027066542Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:28:14.027389 kubelet[1425]: I0212 20:28:14.027099 1425 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:14.027557 env[1112]: time="2024-02-12T20:28:14.027525135Z" level=info msg="StopPodSandbox for \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\"" Feb 12 20:28:14.049809 env[1112]: time="2024-02-12T20:28:14.049730062Z" level=error msg="StopPodSandbox for \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\" failed" error="failed to destroy network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:14.050085 kubelet[1425]: E0212 20:28:14.050055 1425 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:14.050135 kubelet[1425]: E0212 20:28:14.050127 1425 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231"} Feb 12 20:28:14.050177 kubelet[1425]: E0212 20:28:14.050167 1425 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"db2a6781-a9c3-49b8-96ef-9701953605c5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:28:14.050246 kubelet[1425]: E0212 20:28:14.050200 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"db2a6781-a9c3-49b8-96ef-9701953605c5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2fgql" podUID="db2a6781-a9c3-49b8-96ef-9701953605c5" Feb 12 20:28:14.818587 kubelet[1425]: E0212 20:28:14.818536 1425 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:14.831781 kubelet[1425]: E0212 20:28:14.831727 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:15.832538 kubelet[1425]: E0212 20:28:15.832476 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:16.833310 kubelet[1425]: E0212 20:28:16.833251 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:17.833779 kubelet[1425]: E0212 20:28:17.833701 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:17.937720 kubelet[1425]: I0212 20:28:17.937680 1425 topology_manager.go:215] "Topology Admit Handler" podUID="4fc52dc2-2827-421e-978c-0c3f1bae1b4b" podNamespace="default" podName="nginx-deployment-6d5f899847-zz696" Feb 12 20:28:17.942751 systemd[1]: Created slice kubepods-besteffort-pod4fc52dc2_2827_421e_978c_0c3f1bae1b4b.slice. Feb 12 20:28:17.972046 kubelet[1425]: I0212 20:28:17.972018 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mwr4s\" (UniqueName: \"kubernetes.io/projected/4fc52dc2-2827-421e-978c-0c3f1bae1b4b-kube-api-access-mwr4s\") pod \"nginx-deployment-6d5f899847-zz696\" (UID: \"4fc52dc2-2827-421e-978c-0c3f1bae1b4b\") " pod="default/nginx-deployment-6d5f899847-zz696" Feb 12 20:28:18.246058 env[1112]: time="2024-02-12T20:28:18.245971847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-zz696,Uid:4fc52dc2-2827-421e-978c-0c3f1bae1b4b,Namespace:default,Attempt:0,}" Feb 12 20:28:18.312803 env[1112]: time="2024-02-12T20:28:18.312743357Z" level=error msg="Failed to destroy network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:18.314668 env[1112]: time="2024-02-12T20:28:18.313178011Z" level=error msg="encountered an error cleaning up failed sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:18.314668 env[1112]: time="2024-02-12T20:28:18.313237289Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-zz696,Uid:4fc52dc2-2827-421e-978c-0c3f1bae1b4b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:18.314116 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34-shm.mount: Deactivated successfully. Feb 12 20:28:18.314879 kubelet[1425]: E0212 20:28:18.313489 1425 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:18.314879 kubelet[1425]: E0212 20:28:18.313547 1425 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-zz696" Feb 12 20:28:18.314879 kubelet[1425]: E0212 20:28:18.313571 1425 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-zz696" Feb 12 20:28:18.314979 kubelet[1425]: E0212 20:28:18.313628 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-zz696_default(4fc52dc2-2827-421e-978c-0c3f1bae1b4b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-zz696_default(4fc52dc2-2827-421e-978c-0c3f1bae1b4b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-zz696" podUID="4fc52dc2-2827-421e-978c-0c3f1bae1b4b" Feb 12 20:28:18.834454 kubelet[1425]: E0212 20:28:18.834400 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:19.035710 kubelet[1425]: I0212 20:28:19.035671 1425 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:19.036346 env[1112]: time="2024-02-12T20:28:19.036295717Z" level=info msg="StopPodSandbox for \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\"" Feb 12 20:28:19.054361 env[1112]: time="2024-02-12T20:28:19.054287023Z" level=error msg="StopPodSandbox for \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\" failed" error="failed to destroy network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:28:19.054799 kubelet[1425]: E0212 20:28:19.054767 1425 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:19.054872 kubelet[1425]: E0212 20:28:19.054811 1425 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34"} Feb 12 20:28:19.054872 kubelet[1425]: E0212 20:28:19.054843 1425 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4fc52dc2-2827-421e-978c-0c3f1bae1b4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:28:19.054985 kubelet[1425]: E0212 20:28:19.054878 1425 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4fc52dc2-2827-421e-978c-0c3f1bae1b4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-zz696" podUID="4fc52dc2-2827-421e-978c-0c3f1bae1b4b" Feb 12 20:28:19.834772 kubelet[1425]: E0212 20:28:19.834701 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:19.864000 audit[2087]: NETFILTER_CFG table=filter:65 family=2 entries=15 op=nft_register_rule pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:19.867409 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:28:19.867473 kernel: audit: type=1325 audit(1707769699.864:662): table=filter:65 family=2 entries=15 op=nft_register_rule pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:19.867506 kernel: audit: type=1300 audit(1707769699.864:662): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdee936de0 a2=0 a3=7ffdee936dcc items=0 ppid=1627 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:19.864000 audit[2087]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdee936de0 a2=0 a3=7ffdee936dcc items=0 ppid=1627 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:19.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:19.872091 kernel: audit: type=1327 audit(1707769699.864:662): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:19.864000 audit[2087]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:19.864000 audit[2087]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffdee936de0 a2=0 a3=7ffdee936dcc items=0 ppid=1627 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:19.878187 kernel: audit: type=1325 audit(1707769699.864:663): table=nat:66 family=2 entries=19 op=nft_register_chain pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:19.878236 kernel: audit: type=1300 audit(1707769699.864:663): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffdee936de0 a2=0 a3=7ffdee936dcc items=0 ppid=1627 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:19.878268 kernel: audit: type=1327 audit(1707769699.864:663): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:19.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:20.584891 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2461128818.mount: Deactivated successfully. Feb 12 20:28:20.835678 kubelet[1425]: E0212 20:28:20.835573 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:21.320796 env[1112]: time="2024-02-12T20:28:21.320740170Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:21.322687 env[1112]: time="2024-02-12T20:28:21.322650637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:21.324011 env[1112]: time="2024-02-12T20:28:21.323981128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:21.325287 env[1112]: time="2024-02-12T20:28:21.325262494Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:21.325656 env[1112]: time="2024-02-12T20:28:21.325626175Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 20:28:21.333292 env[1112]: time="2024-02-12T20:28:21.333244619Z" level=info msg="CreateContainer within sandbox \"a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:28:21.407936 env[1112]: time="2024-02-12T20:28:21.407872535Z" level=info msg="CreateContainer within sandbox \"a913aca0b36bf144f638664d0125b64c06f267488b2e5f2e8bc060aa41fdcfb4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8a0921ad9b12379a839cc917fc42fcfab007f7ba9f0189ef2217370e887d9271\"" Feb 12 20:28:21.408397 env[1112]: time="2024-02-12T20:28:21.408363987Z" level=info msg="StartContainer for \"8a0921ad9b12379a839cc917fc42fcfab007f7ba9f0189ef2217370e887d9271\"" Feb 12 20:28:21.422601 systemd[1]: Started cri-containerd-8a0921ad9b12379a839cc917fc42fcfab007f7ba9f0189ef2217370e887d9271.scope. Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7a612732f8 items=0 ppid=1537 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:21.447429 kernel: audit: type=1400 audit(1707769701.435:664): avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.447500 kernel: audit: type=1300 audit(1707769701.435:664): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7a612732f8 items=0 ppid=1537 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:21.447521 kernel: audit: type=1327 audit(1707769701.435:664): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861303932316164396231323337396138333963633931376663343266 Feb 12 20:28:21.447537 kernel: audit: type=1400 audit(1707769701.435:665): avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861303932316164396231323337396138333963633931376663343266 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.435000 audit: BPF prog-id=81 op=LOAD Feb 12 20:28:21.435000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024ec8 items=0 ppid=1537 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:21.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861303932316164396231323337396138333963633931376663343266 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.441000 audit: BPF prog-id=82 op=LOAD Feb 12 20:28:21.441000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024f18 items=0 ppid=1537 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:21.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861303932316164396231323337396138333963633931376663343266 Feb 12 20:28:21.444000 audit: BPF prog-id=82 op=UNLOAD Feb 12 20:28:21.444000 audit: BPF prog-id=81 op=UNLOAD Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { perfmon } for pid=2098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit[2098]: AVC avc: denied { bpf } for pid=2098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:21.444000 audit: BPF prog-id=83 op=LOAD Feb 12 20:28:21.444000 audit[2098]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024fa8 items=0 ppid=1537 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:21.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861303932316164396231323337396138333963633931376663343266 Feb 12 20:28:21.459329 env[1112]: time="2024-02-12T20:28:21.459282741Z" level=info msg="StartContainer for \"8a0921ad9b12379a839cc917fc42fcfab007f7ba9f0189ef2217370e887d9271\" returns successfully" Feb 12 20:28:21.515380 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:28:21.515487 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:28:21.836021 kubelet[1425]: E0212 20:28:21.835924 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:22.041449 kubelet[1425]: E0212 20:28:22.041411 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:22.053048 kubelet[1425]: I0212 20:28:22.052982 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4nkpg" podStartSLOduration=4.527930509 podCreationTimestamp="2024-02-12 20:27:56 +0000 UTC" firstStartedPulling="2024-02-12 20:27:59.800832135 +0000 UTC m=+5.306117791" lastFinishedPulling="2024-02-12 20:28:21.32584265 +0000 UTC m=+26.831128315" observedRunningTime="2024-02-12 20:28:22.052880773 +0000 UTC m=+27.558166428" watchObservedRunningTime="2024-02-12 20:28:22.052941033 +0000 UTC m=+27.558226688" Feb 12 20:28:22.755000 audit[2234]: AVC avc: denied { write } for pid=2234 comm="tee" name="fd" dev="proc" ino=17376 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:22.755000 audit[2234]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4bb3c983 a2=241 a3=1b6 items=1 ppid=2188 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.755000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:28:22.755000 audit: PATH item=0 name="/dev/fd/63" inode=17365 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:22.755000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:22.758000 audit[2241]: AVC avc: denied { write } for pid=2241 comm="tee" name="fd" dev="proc" ino=19874 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:22.758000 audit[2241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3c963982 a2=241 a3=1b6 items=1 ppid=2198 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.758000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:28:22.758000 audit: PATH item=0 name="/dev/fd/63" inode=19868 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:22.758000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:22.759000 audit[2245]: AVC avc: denied { write } for pid=2245 comm="tee" name="fd" dev="proc" ino=19878 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:22.759000 audit[2245]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd23f9992 a2=241 a3=1b6 items=1 ppid=2192 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.759000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:28:22.759000 audit: PATH item=0 name="/dev/fd/63" inode=19871 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:22.759000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:22.761000 audit[2254]: AVC avc: denied { write } for pid=2254 comm="tee" name="fd" dev="proc" ino=19882 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:22.761000 audit[2254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd40373993 a2=241 a3=1b6 items=1 ppid=2191 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.761000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:28:22.761000 audit: PATH item=0 name="/dev/fd/63" inode=17378 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:22.761000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:22.761000 audit[2246]: AVC avc: denied { write } for pid=2246 comm="tee" name="fd" dev="proc" ino=20736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:22.761000 audit[2246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc13606994 a2=241 a3=1b6 items=1 ppid=2197 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.761000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:28:22.761000 audit: PATH item=0 name="/dev/fd/63" inode=17371 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:22.761000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:22.767000 audit[2263]: AVC avc: denied { write } for pid=2263 comm="tee" name="fd" dev="proc" ino=19889 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:22.767000 audit[2263]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5c8ff992 a2=241 a3=1b6 items=1 ppid=2202 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.767000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:28:22.767000 audit: PATH item=0 name="/dev/fd/63" inode=17382 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:22.767000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:22.776000 audit[2261]: AVC avc: denied { write } for pid=2261 comm="tee" name="fd" dev="proc" ino=19893 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:28:22.776000 audit[2261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf6674992 a2=241 a3=1b6 items=1 ppid=2195 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.776000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:28:22.776000 audit: PATH item=0 name="/dev/fd/63" inode=19886 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:22.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:28:22.836739 kubelet[1425]: E0212 20:28:22.836690 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:22.858083 kernel: Initializing XFRM netlink socket Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit: BPF prog-id=84 op=LOAD Feb 12 20:28:22.921000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2c67b280 a2=70 a3=7fb39594b000 items=0 ppid=2203 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:22.921000 audit: BPF prog-id=84 op=UNLOAD Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit: BPF prog-id=85 op=LOAD Feb 12 20:28:22.921000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2c67b280 a2=70 a3=6e items=0 ppid=2203 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:22.921000 audit: BPF prog-id=85 op=UNLOAD Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd2c67b230 a2=70 a3=7ffd2c67b280 items=0 ppid=2203 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit: BPF prog-id=86 op=LOAD Feb 12 20:28:22.921000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd2c67b210 a2=70 a3=7ffd2c67b280 items=0 ppid=2203 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:22.921000 audit: BPF prog-id=86 op=UNLOAD Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2c67b2f0 a2=70 a3=0 items=0 ppid=2203 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2c67b2e0 a2=70 a3=0 items=0 ppid=2203 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd2c67b320 a2=70 a3=0 items=0 ppid=2203 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { bpf } for pid=2334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: AVC avc: denied { perfmon } for pid=2334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.921000 audit[2334]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd2c67b240 a2=70 a3=ffffffff items=0 ppid=2203 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.921000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:28:22.925000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.925000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd16b5b180 a2=70 a3=208 items=0 ppid=2203 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:28:22.925000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:22.925000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd16b5b050 a2=70 a3=3 items=0 ppid=2203 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.925000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:28:22.934000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:28:22.963000 audit[2362]: NETFILTER_CFG table=mangle:67 family=2 entries=19 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:22.963000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff0ecb1a80 a2=0 a3=7fff0ecb1a6c items=0 ppid=2203 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.963000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:22.965000 audit[2364]: NETFILTER_CFG table=nat:68 family=2 entries=16 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:22.965000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe1fb7d870 a2=0 a3=55b43d505000 items=0 ppid=2203 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.965000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:22.967000 audit[2365]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:22.967000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffcf6fb2dd0 a2=0 a3=5555c3315000 items=0 ppid=2203 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.967000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:22.973000 audit[2370]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:22.973000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe53b6a150 a2=0 a3=7ffe53b6a13c items=0 ppid=2203 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:22.973000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:23.045511 kubelet[1425]: E0212 20:28:23.043210 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:23.837027 kubelet[1425]: E0212 20:28:23.836953 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:23.867514 systemd-networkd[1022]: vxlan.calico: Link UP Feb 12 20:28:23.867522 systemd-networkd[1022]: vxlan.calico: Gained carrier Feb 12 20:28:24.838110 kubelet[1425]: E0212 20:28:24.838060 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:24.990138 systemd-networkd[1022]: vxlan.calico: Gained IPv6LL Feb 12 20:28:25.839217 kubelet[1425]: E0212 20:28:25.839163 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:26.839938 kubelet[1425]: E0212 20:28:26.839864 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:27.840275 kubelet[1425]: E0212 20:28:27.840215 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:28.675000 audit[2410]: NETFILTER_CFG table=filter:71 family=2 entries=14 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:28.678357 kernel: kauditd_printk_skb: 165 callbacks suppressed Feb 12 20:28:28.678430 kernel: audit: type=1325 audit(1707769708.675:695): table=filter:71 family=2 entries=14 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:28.678460 kernel: audit: type=1300 audit(1707769708.675:695): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffea2c3cfd0 a2=0 a3=7ffea2c3cfbc items=0 ppid=1627 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:28.675000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffea2c3cfd0 a2=0 a3=7ffea2c3cfbc items=0 ppid=1627 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:28.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:28.683020 kernel: audit: type=1327 audit(1707769708.675:695): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:28.675000 audit[2410]: NETFILTER_CFG table=nat:72 family=2 entries=14 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:28.675000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffea2c3cfd0 a2=0 a3=31030 items=0 ppid=1627 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:28.689656 kernel: audit: type=1325 audit(1707769708.675:696): table=nat:72 family=2 entries=14 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:28.689716 kernel: audit: type=1300 audit(1707769708.675:696): arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffea2c3cfd0 a2=0 a3=31030 items=0 ppid=1627 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:28.689740 kernel: audit: type=1327 audit(1707769708.675:696): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:28.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:28.688000 audit[2412]: NETFILTER_CFG table=filter:73 family=2 entries=11 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:28.688000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd07201390 a2=0 a3=7ffd0720137c items=0 ppid=1627 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:28.697802 kernel: audit: type=1325 audit(1707769708.688:697): table=filter:73 family=2 entries=11 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:28.697887 kernel: audit: type=1300 audit(1707769708.688:697): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd07201390 a2=0 a3=7ffd0720137c items=0 ppid=1627 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:28.697915 kernel: audit: type=1327 audit(1707769708.688:697): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:28.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:28.693000 audit[2412]: NETFILTER_CFG table=nat:74 family=2 entries=35 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:28.693000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffd07201390 a2=0 a3=7ffd0720137c items=0 ppid=1627 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:28.693000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:28.707011 kernel: audit: type=1325 audit(1707769708.693:698): table=nat:74 family=2 entries=35 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:28.841146 kubelet[1425]: E0212 20:28:28.841071 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:28.993727 env[1112]: time="2024-02-12T20:28:28.993598687Z" level=info msg="StopPodSandbox for \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\"" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.029 [INFO][2432] k8s.go 578: Cleaning up netns ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.029 [INFO][2432] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" iface="eth0" netns="/var/run/netns/cni-2a18c3db-d82c-53e5-32c7-751d8bd4ec85" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.029 [INFO][2432] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" iface="eth0" netns="/var/run/netns/cni-2a18c3db-d82c-53e5-32c7-751d8bd4ec85" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.029 [INFO][2432] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" iface="eth0" netns="/var/run/netns/cni-2a18c3db-d82c-53e5-32c7-751d8bd4ec85" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.029 [INFO][2432] k8s.go 585: Releasing IP address(es) ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.029 [INFO][2432] utils.go 188: Calico CNI releasing IP address ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.046 [INFO][2440] ipam_plugin.go 415: Releasing address using handleID ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.046 [INFO][2440] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.046 [INFO][2440] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.052 [WARNING][2440] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.052 [INFO][2440] ipam_plugin.go 443: Releasing address using workloadID ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.053 [INFO][2440] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:29.056024 env[1112]: 2024-02-12 20:28:29.054 [INFO][2432] k8s.go 591: Teardown processing complete. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:29.056534 env[1112]: time="2024-02-12T20:28:29.056163172Z" level=info msg="TearDown network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\" successfully" Feb 12 20:28:29.056534 env[1112]: time="2024-02-12T20:28:29.056203861Z" level=info msg="StopPodSandbox for \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\" returns successfully" Feb 12 20:28:29.056838 env[1112]: time="2024-02-12T20:28:29.056790511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2fgql,Uid:db2a6781-a9c3-49b8-96ef-9701953605c5,Namespace:calico-system,Attempt:1,}" Feb 12 20:28:29.057306 systemd[1]: run-netns-cni\x2d2a18c3db\x2dd82c\x2d53e5\x2d32c7\x2d751d8bd4ec85.mount: Deactivated successfully. Feb 12 20:28:29.176359 systemd-networkd[1022]: cali90e0e78114b: Link UP Feb 12 20:28:29.178077 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:28:29.178124 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali90e0e78114b: link becomes ready Feb 12 20:28:29.177920 systemd-networkd[1022]: cali90e0e78114b: Gained carrier Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.126 [INFO][2447] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-csi--node--driver--2fgql-eth0 csi-node-driver- calico-system db2a6781-a9c3-49b8-96ef-9701953605c5 887 0 2024-02-12 20:27:56 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 csi-node-driver-2fgql eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali90e0e78114b [] []}} ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Namespace="calico-system" Pod="csi-node-driver-2fgql" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--2fgql-" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.126 [INFO][2447] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Namespace="calico-system" Pod="csi-node-driver-2fgql" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.145 [INFO][2460] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" HandleID="k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.155 [INFO][2460] ipam_plugin.go 268: Auto assigning IP ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" HandleID="k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00057d920), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.120", "pod":"csi-node-driver-2fgql", "timestamp":"2024-02-12 20:28:29.14559901 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.155 [INFO][2460] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.155 [INFO][2460] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.155 [INFO][2460] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.156 [INFO][2460] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.159 [INFO][2460] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.162 [INFO][2460] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.164 [INFO][2460] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.165 [INFO][2460] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.165 [INFO][2460] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.166 [INFO][2460] ipam.go 1682: Creating new handle: k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723 Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.169 [INFO][2460] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.172 [INFO][2460] ipam.go 1216: Successfully claimed IPs: [192.168.77.65/26] block=192.168.77.64/26 handle="k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.172 [INFO][2460] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.65/26] handle="k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" host="10.0.0.120" Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.172 [INFO][2460] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:29.188117 env[1112]: 2024-02-12 20:28:29.172 [INFO][2460] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.65/26] IPv6=[] ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" HandleID="k8s-pod-network.7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.188674 env[1112]: 2024-02-12 20:28:29.174 [INFO][2447] k8s.go 385: Populated endpoint ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Namespace="calico-system" Pod="csi-node-driver-2fgql" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--2fgql-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"db2a6781-a9c3-49b8-96ef-9701953605c5", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"csi-node-driver-2fgql", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali90e0e78114b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:29.188674 env[1112]: 2024-02-12 20:28:29.174 [INFO][2447] k8s.go 386: Calico CNI using IPs: [192.168.77.65/32] ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Namespace="calico-system" Pod="csi-node-driver-2fgql" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.188674 env[1112]: 2024-02-12 20:28:29.174 [INFO][2447] dataplane_linux.go 68: Setting the host side veth name to cali90e0e78114b ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Namespace="calico-system" Pod="csi-node-driver-2fgql" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.188674 env[1112]: 2024-02-12 20:28:29.177 [INFO][2447] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Namespace="calico-system" Pod="csi-node-driver-2fgql" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.188674 env[1112]: 2024-02-12 20:28:29.178 [INFO][2447] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Namespace="calico-system" Pod="csi-node-driver-2fgql" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--2fgql-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"db2a6781-a9c3-49b8-96ef-9701953605c5", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723", Pod:"csi-node-driver-2fgql", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali90e0e78114b", MAC:"d2:bb:80:46:bf:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:29.188674 env[1112]: 2024-02-12 20:28:29.183 [INFO][2447] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723" Namespace="calico-system" Pod="csi-node-driver-2fgql" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:29.194000 audit[2486]: NETFILTER_CFG table=filter:75 family=2 entries=36 op=nft_register_chain pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:29.194000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff998a6970 a2=0 a3=7fff998a695c items=0 ppid=2203 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.194000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:29.199559 env[1112]: time="2024-02-12T20:28:29.199485704Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:29.199559 env[1112]: time="2024-02-12T20:28:29.199537703Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:29.199559 env[1112]: time="2024-02-12T20:28:29.199549846Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:29.199757 env[1112]: time="2024-02-12T20:28:29.199708069Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723 pid=2494 runtime=io.containerd.runc.v2 Feb 12 20:28:29.209148 systemd[1]: Started cri-containerd-7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723.scope. Feb 12 20:28:29.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit: BPF prog-id=88 op=LOAD Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2494 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356661626566343265316663396565373733366465333130336232 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2494 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356661626566343265316663396565373733366465333130336232 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit: BPF prog-id=89 op=LOAD Feb 12 20:28:29.216000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000ddce0 items=0 ppid=2494 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356661626566343265316663396565373733366465333130336232 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.216000 audit: BPF prog-id=90 op=LOAD Feb 12 20:28:29.216000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000ddd28 items=0 ppid=2494 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356661626566343265316663396565373733366465333130336232 Feb 12 20:28:29.216000 audit: BPF prog-id=90 op=UNLOAD Feb 12 20:28:29.216000 audit: BPF prog-id=89 op=UNLOAD Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { perfmon } for pid=2505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit[2505]: AVC avc: denied { bpf } for pid=2505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:29.217000 audit: BPF prog-id=91 op=LOAD Feb 12 20:28:29.217000 audit[2505]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000342138 items=0 ppid=2494 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762356661626566343265316663396565373733366465333130336232 Feb 12 20:28:29.219033 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:29.226127 env[1112]: time="2024-02-12T20:28:29.226078865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2fgql,Uid:db2a6781-a9c3-49b8-96ef-9701953605c5,Namespace:calico-system,Attempt:1,} returns sandbox id \"7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723\"" Feb 12 20:28:29.227444 env[1112]: time="2024-02-12T20:28:29.227421698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:28:29.716000 audit[2528]: NETFILTER_CFG table=filter:76 family=2 entries=8 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:29.716000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc36332670 a2=0 a3=7ffc3633265c items=0 ppid=1627 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:29.719000 audit[2528]: NETFILTER_CFG table=nat:77 family=2 entries=56 op=nft_register_chain pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:29.719000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffc36332670 a2=0 a3=7ffc3633265c items=0 ppid=1627 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:29.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:29.842118 kubelet[1425]: E0212 20:28:29.842065 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:30.558163 systemd-networkd[1022]: cali90e0e78114b: Gained IPv6LL Feb 12 20:28:30.697317 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1754684878.mount: Deactivated successfully. Feb 12 20:28:30.842395 kubelet[1425]: E0212 20:28:30.842297 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:30.993731 env[1112]: time="2024-02-12T20:28:30.993684484Z" level=info msg="StopPodSandbox for \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\"" Feb 12 20:28:31.026226 env[1112]: time="2024-02-12T20:28:31.026173883Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:31.027988 env[1112]: time="2024-02-12T20:28:31.027949027Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:31.029647 env[1112]: time="2024-02-12T20:28:31.029626488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:31.030981 env[1112]: time="2024-02-12T20:28:31.030951936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:31.031449 env[1112]: time="2024-02-12T20:28:31.031415869Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 20:28:31.033083 env[1112]: time="2024-02-12T20:28:31.033058430Z" level=info msg="CreateContainer within sandbox \"7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:28:31.044428 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2877355288.mount: Deactivated successfully. Feb 12 20:28:31.052618 env[1112]: time="2024-02-12T20:28:31.052544894Z" level=info msg="CreateContainer within sandbox \"7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"030e441045734eb2db86a612c7642f532c4c54a6d6f0a6e0297125a0aef8b384\"" Feb 12 20:28:31.053459 env[1112]: time="2024-02-12T20:28:31.053419983Z" level=info msg="StartContainer for \"030e441045734eb2db86a612c7642f532c4c54a6d6f0a6e0297125a0aef8b384\"" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.028 [INFO][2546] k8s.go 578: Cleaning up netns ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.028 [INFO][2546] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" iface="eth0" netns="/var/run/netns/cni-b27ad7ac-8f6c-15cd-b82d-02b2f33a6472" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.029 [INFO][2546] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" iface="eth0" netns="/var/run/netns/cni-b27ad7ac-8f6c-15cd-b82d-02b2f33a6472" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.029 [INFO][2546] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" iface="eth0" netns="/var/run/netns/cni-b27ad7ac-8f6c-15cd-b82d-02b2f33a6472" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.029 [INFO][2546] k8s.go 585: Releasing IP address(es) ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.029 [INFO][2546] utils.go 188: Calico CNI releasing IP address ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.044 [INFO][2554] ipam_plugin.go 415: Releasing address using handleID ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.044 [INFO][2554] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.044 [INFO][2554] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.052 [WARNING][2554] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.052 [INFO][2554] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.054 [INFO][2554] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:31.057047 env[1112]: 2024-02-12 20:28:31.055 [INFO][2546] k8s.go 591: Teardown processing complete. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:31.057706 env[1112]: time="2024-02-12T20:28:31.057678479Z" level=info msg="TearDown network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\" successfully" Feb 12 20:28:31.057795 env[1112]: time="2024-02-12T20:28:31.057770608Z" level=info msg="StopPodSandbox for \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\" returns successfully" Feb 12 20:28:31.059118 systemd[1]: run-netns-cni\x2db27ad7ac\x2d8f6c\x2d15cd\x2db82d\x2d02b2f33a6472.mount: Deactivated successfully. Feb 12 20:28:31.060086 env[1112]: time="2024-02-12T20:28:31.060045057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-zz696,Uid:4fc52dc2-2827-421e-978c-0c3f1bae1b4b,Namespace:default,Attempt:1,}" Feb 12 20:28:31.073270 systemd[1]: run-containerd-runc-k8s.io-030e441045734eb2db86a612c7642f532c4c54a6d6f0a6e0297125a0aef8b384-runc.gnydbS.mount: Deactivated successfully. Feb 12 20:28:31.074471 systemd[1]: Started cri-containerd-030e441045734eb2db86a612c7642f532c4c54a6d6f0a6e0297125a0aef8b384.scope. Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fab4d0b12f8 items=0 ppid=2494 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033306534343130343537333465623264623836613631326337363432 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit: BPF prog-id=92 op=LOAD Feb 12 20:28:31.091000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024df8 items=0 ppid=2494 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033306534343130343537333465623264623836613631326337363432 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit: BPF prog-id=93 op=LOAD Feb 12 20:28:31.091000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024e48 items=0 ppid=2494 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033306534343130343537333465623264623836613631326337363432 Feb 12 20:28:31.091000 audit: BPF prog-id=93 op=UNLOAD Feb 12 20:28:31.091000 audit: BPF prog-id=92 op=UNLOAD Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.091000 audit: BPF prog-id=94 op=LOAD Feb 12 20:28:31.091000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024ed8 items=0 ppid=2494 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033306534343130343537333465623264623836613631326337363432 Feb 12 20:28:31.107039 env[1112]: time="2024-02-12T20:28:31.106983014Z" level=info msg="StartContainer for \"030e441045734eb2db86a612c7642f532c4c54a6d6f0a6e0297125a0aef8b384\" returns successfully" Feb 12 20:28:31.108704 env[1112]: time="2024-02-12T20:28:31.108654991Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:28:31.168721 systemd-networkd[1022]: cali28d4a320122: Link UP Feb 12 20:28:31.170543 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:28:31.170583 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali28d4a320122: link becomes ready Feb 12 20:28:31.170831 systemd-networkd[1022]: cali28d4a320122: Gained carrier Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.118 [INFO][2588] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0 nginx-deployment-6d5f899847- default 4fc52dc2-2827-421e-978c-0c3f1bae1b4b 905 0 2024-02-12 20:28:17 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 nginx-deployment-6d5f899847-zz696 eth0 default [] [] [kns.default ksa.default.default] cali28d4a320122 [] []}} ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Namespace="default" Pod="nginx-deployment-6d5f899847-zz696" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.118 [INFO][2588] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Namespace="default" Pod="nginx-deployment-6d5f899847-zz696" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.138 [INFO][2612] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" HandleID="k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.146 [INFO][2612] ipam_plugin.go 268: Auto assigning IP ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" HandleID="k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000247ae0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"nginx-deployment-6d5f899847-zz696", "timestamp":"2024-02-12 20:28:31.138265565 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.146 [INFO][2612] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.146 [INFO][2612] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.147 [INFO][2612] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.148 [INFO][2612] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.151 [INFO][2612] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.154 [INFO][2612] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.156 [INFO][2612] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.158 [INFO][2612] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.158 [INFO][2612] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.159 [INFO][2612] ipam.go 1682: Creating new handle: k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264 Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.162 [INFO][2612] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.165 [INFO][2612] ipam.go 1216: Successfully claimed IPs: [192.168.77.66/26] block=192.168.77.64/26 handle="k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.165 [INFO][2612] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.66/26] handle="k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" host="10.0.0.120" Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.165 [INFO][2612] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:31.178247 env[1112]: 2024-02-12 20:28:31.165 [INFO][2612] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.66/26] IPv6=[] ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" HandleID="k8s-pod-network.accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.178849 env[1112]: 2024-02-12 20:28:31.167 [INFO][2588] k8s.go 385: Populated endpoint ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Namespace="default" Pod="nginx-deployment-6d5f899847-zz696" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4fc52dc2-2827-421e-978c-0c3f1bae1b4b", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"nginx-deployment-6d5f899847-zz696", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali28d4a320122", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:31.178849 env[1112]: 2024-02-12 20:28:31.167 [INFO][2588] k8s.go 386: Calico CNI using IPs: [192.168.77.66/32] ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Namespace="default" Pod="nginx-deployment-6d5f899847-zz696" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.178849 env[1112]: 2024-02-12 20:28:31.167 [INFO][2588] dataplane_linux.go 68: Setting the host side veth name to cali28d4a320122 ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Namespace="default" Pod="nginx-deployment-6d5f899847-zz696" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.178849 env[1112]: 2024-02-12 20:28:31.171 [INFO][2588] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Namespace="default" Pod="nginx-deployment-6d5f899847-zz696" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.178849 env[1112]: 2024-02-12 20:28:31.171 [INFO][2588] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Namespace="default" Pod="nginx-deployment-6d5f899847-zz696" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4fc52dc2-2827-421e-978c-0c3f1bae1b4b", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264", Pod:"nginx-deployment-6d5f899847-zz696", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali28d4a320122", MAC:"72:de:d6:5e:fa:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:31.178849 env[1112]: 2024-02-12 20:28:31.175 [INFO][2588] k8s.go 491: Wrote updated endpoint to datastore ContainerID="accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264" Namespace="default" Pod="nginx-deployment-6d5f899847-zz696" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:31.187000 audit[2635]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:31.187000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffcbfc00380 a2=0 a3=7ffcbfc0036c items=0 ppid=2203 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.187000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:31.197949 env[1112]: time="2024-02-12T20:28:31.197862646Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:31.197949 env[1112]: time="2024-02-12T20:28:31.197901648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:31.197949 env[1112]: time="2024-02-12T20:28:31.197913659Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:31.198364 env[1112]: time="2024-02-12T20:28:31.198322329Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264 pid=2643 runtime=io.containerd.runc.v2 Feb 12 20:28:31.208466 systemd[1]: Started cri-containerd-accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264.scope. Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit: BPF prog-id=95 op=LOAD Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2643 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636566386437303432623065663364643437316139306533336130 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2643 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636566386437303432623065663364643437316139306533336130 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.221000 audit: BPF prog-id=96 op=LOAD Feb 12 20:28:31.221000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00035bfa0 items=0 ppid=2643 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636566386437303432623065663364643437316139306533336130 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit: BPF prog-id=97 op=LOAD Feb 12 20:28:31.222000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00035bfe8 items=0 ppid=2643 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636566386437303432623065663364643437316139306533336130 Feb 12 20:28:31.222000 audit: BPF prog-id=97 op=UNLOAD Feb 12 20:28:31.222000 audit: BPF prog-id=96 op=UNLOAD Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:31.222000 audit: BPF prog-id=98 op=LOAD Feb 12 20:28:31.222000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dc3f8 items=0 ppid=2643 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:31.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163636566386437303432623065663364643437316139306533336130 Feb 12 20:28:31.224390 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:31.245325 env[1112]: time="2024-02-12T20:28:31.245275786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-zz696,Uid:4fc52dc2-2827-421e-978c-0c3f1bae1b4b,Namespace:default,Attempt:1,} returns sandbox id \"accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264\"" Feb 12 20:28:31.842766 kubelet[1425]: E0212 20:28:31.842722 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:32.588009 env[1112]: time="2024-02-12T20:28:32.587955694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:32.589551 env[1112]: time="2024-02-12T20:28:32.589526640Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:32.590893 env[1112]: time="2024-02-12T20:28:32.590864712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:32.592255 env[1112]: time="2024-02-12T20:28:32.592227656Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:32.592641 env[1112]: time="2024-02-12T20:28:32.592616240Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 20:28:32.593159 env[1112]: time="2024-02-12T20:28:32.593126674Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 20:28:32.594026 env[1112]: time="2024-02-12T20:28:32.594003416Z" level=info msg="CreateContainer within sandbox \"7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:28:32.606478 env[1112]: time="2024-02-12T20:28:32.606446820Z" level=info msg="CreateContainer within sandbox \"7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2c8023c3a9a738a06bf1a94caceb6b9d66b14a27a024c49f9befb92ae0697982\"" Feb 12 20:28:32.606829 env[1112]: time="2024-02-12T20:28:32.606800234Z" level=info msg="StartContainer for \"2c8023c3a9a738a06bf1a94caceb6b9d66b14a27a024c49f9befb92ae0697982\"" Feb 12 20:28:32.622473 systemd[1]: Started cri-containerd-2c8023c3a9a738a06bf1a94caceb6b9d66b14a27a024c49f9befb92ae0697982.scope. Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fea8adc6b58 items=0 ppid=2494 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:32.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383032336333613961373338613036626631613934636163656236 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit: BPF prog-id=99 op=LOAD Feb 12 20:28:32.634000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034bba8 items=0 ppid=2494 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:32.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383032336333613961373338613036626631613934636163656236 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit: BPF prog-id=100 op=LOAD Feb 12 20:28:32.634000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034bbf8 items=0 ppid=2494 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:32.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383032336333613961373338613036626631613934636163656236 Feb 12 20:28:32.634000 audit: BPF prog-id=100 op=UNLOAD Feb 12 20:28:32.634000 audit: BPF prog-id=99 op=UNLOAD Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:32.634000 audit: BPF prog-id=101 op=LOAD Feb 12 20:28:32.634000 audit[2686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034bc88 items=0 ppid=2494 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:32.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263383032336333613961373338613036626631613934636163656236 Feb 12 20:28:32.647467 env[1112]: time="2024-02-12T20:28:32.647424447Z" level=info msg="StartContainer for \"2c8023c3a9a738a06bf1a94caceb6b9d66b14a27a024c49f9befb92ae0697982\" returns successfully" Feb 12 20:28:32.843870 kubelet[1425]: E0212 20:28:32.843754 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:33.054151 systemd-networkd[1022]: cali28d4a320122: Gained IPv6LL Feb 12 20:28:33.059046 systemd[1]: run-containerd-runc-k8s.io-2c8023c3a9a738a06bf1a94caceb6b9d66b14a27a024c49f9befb92ae0697982-runc.4nAKFy.mount: Deactivated successfully. Feb 12 20:28:33.079101 kubelet[1425]: I0212 20:28:33.079059 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-2fgql" podStartSLOduration=33.713197745 podCreationTimestamp="2024-02-12 20:27:56 +0000 UTC" firstStartedPulling="2024-02-12 20:28:29.227055147 +0000 UTC m=+34.732340802" lastFinishedPulling="2024-02-12 20:28:32.592880184 +0000 UTC m=+38.098165839" observedRunningTime="2024-02-12 20:28:33.078846768 +0000 UTC m=+38.584132424" watchObservedRunningTime="2024-02-12 20:28:33.079022782 +0000 UTC m=+38.584308437" Feb 12 20:28:33.089944 kubelet[1425]: I0212 20:28:33.089905 1425 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:28:33.089944 kubelet[1425]: I0212 20:28:33.089946 1425 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:28:33.844308 kubelet[1425]: E0212 20:28:33.844271 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:34.818840 kubelet[1425]: E0212 20:28:34.818791 1425 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:34.844970 kubelet[1425]: E0212 20:28:34.844937 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:35.126491 update_engine[1107]: I0212 20:28:35.126449 1107 update_attempter.cc:509] Updating boot flags... Feb 12 20:28:35.425021 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount436316864.mount: Deactivated successfully. Feb 12 20:28:35.845863 kubelet[1425]: E0212 20:28:35.845750 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:36.472360 env[1112]: time="2024-02-12T20:28:36.472306806Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:36.473835 env[1112]: time="2024-02-12T20:28:36.473805638Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:36.475187 env[1112]: time="2024-02-12T20:28:36.475161022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:36.476595 env[1112]: time="2024-02-12T20:28:36.476568933Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:36.477194 env[1112]: time="2024-02-12T20:28:36.477142578Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 20:28:36.478650 env[1112]: time="2024-02-12T20:28:36.478612329Z" level=info msg="CreateContainer within sandbox \"accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 20:28:36.488836 env[1112]: time="2024-02-12T20:28:36.488789351Z" level=info msg="CreateContainer within sandbox \"accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"a35bc5dcea14627fc07d5d53e0d50931ea26584a8ec094396714edeb4a32945c\"" Feb 12 20:28:36.489252 env[1112]: time="2024-02-12T20:28:36.489225721Z" level=info msg="StartContainer for \"a35bc5dcea14627fc07d5d53e0d50931ea26584a8ec094396714edeb4a32945c\"" Feb 12 20:28:36.503934 systemd[1]: Started cri-containerd-a35bc5dcea14627fc07d5d53e0d50931ea26584a8ec094396714edeb4a32945c.scope. Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.514017 kernel: kauditd_printk_skb: 214 callbacks suppressed Feb 12 20:28:36.514076 kernel: audit: type=1400 audit(1707769716.510:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.516379 kernel: audit: type=1400 audit(1707769716.510:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.516421 kernel: audit: type=1400 audit(1707769716.510:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.520317 kernel: audit: type=1400 audit(1707769716.510:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.520359 kernel: audit: type=1400 audit(1707769716.510:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.522343 kernel: audit: type=1400 audit(1707769716.510:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.526381 kernel: audit: type=1400 audit(1707769716.510:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.526488 kernel: audit: type=1400 audit(1707769716.510:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.530185 kernel: audit: type=1400 audit(1707769716.510:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.530227 kernel: audit: type=1400 audit(1707769716.513:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit: BPF prog-id=102 op=LOAD Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2643 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356263356463656131343632376663303764356435336530643530 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2643 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356263356463656131343632376663303764356435336530643530 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.513000 audit: BPF prog-id=103 op=LOAD Feb 12 20:28:36.513000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003947b0 items=0 ppid=2643 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356263356463656131343632376663303764356435336530643530 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.515000 audit: BPF prog-id=104 op=LOAD Feb 12 20:28:36.515000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003947f8 items=0 ppid=2643 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356263356463656131343632376663303764356435336530643530 Feb 12 20:28:36.519000 audit: BPF prog-id=104 op=UNLOAD Feb 12 20:28:36.519000 audit: BPF prog-id=103 op=UNLOAD Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { perfmon } for pid=2750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit[2750]: AVC avc: denied { bpf } for pid=2750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:36.519000 audit: BPF prog-id=105 op=LOAD Feb 12 20:28:36.519000 audit[2750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000394c08 items=0 ppid=2643 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:36.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133356263356463656131343632376663303764356435336530643530 Feb 12 20:28:36.541274 env[1112]: time="2024-02-12T20:28:36.541231121Z" level=info msg="StartContainer for \"a35bc5dcea14627fc07d5d53e0d50931ea26584a8ec094396714edeb4a32945c\" returns successfully" Feb 12 20:28:36.846884 kubelet[1425]: E0212 20:28:36.846742 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:37.083028 kubelet[1425]: I0212 20:28:37.082969 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-zz696" podStartSLOduration=14.851907884 podCreationTimestamp="2024-02-12 20:28:17 +0000 UTC" firstStartedPulling="2024-02-12 20:28:31.24634544 +0000 UTC m=+36.751631095" lastFinishedPulling="2024-02-12 20:28:36.477365258 +0000 UTC m=+41.982650913" observedRunningTime="2024-02-12 20:28:37.082762526 +0000 UTC m=+42.588048181" watchObservedRunningTime="2024-02-12 20:28:37.082927702 +0000 UTC m=+42.588213358" Feb 12 20:28:37.847283 kubelet[1425]: E0212 20:28:37.847234 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:38.243624 systemd[1]: run-containerd-runc-k8s.io-8a0921ad9b12379a839cc917fc42fcfab007f7ba9f0189ef2217370e887d9271-runc.XbEntP.mount: Deactivated successfully. Feb 12 20:28:38.286572 kubelet[1425]: E0212 20:28:38.286529 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:28:38.847797 kubelet[1425]: E0212 20:28:38.847746 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:39.846000 audit[2823]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:39.846000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe17af1d00 a2=0 a3=7ffe17af1cec items=0 ppid=1627 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:39.848247 kubelet[1425]: E0212 20:28:39.848212 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:39.847000 audit[2823]: NETFILTER_CFG table=nat:80 family=2 entries=20 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:39.847000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe17af1d00 a2=0 a3=31030 items=0 ppid=1627 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:39.858000 audit[2825]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:39.858000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe05816ab0 a2=0 a3=7ffe05816a9c items=0 ppid=1627 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:39.861000 audit[2825]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:39.861000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe05816ab0 a2=0 a3=31030 items=0 ppid=1627 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:39.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:39.872589 kubelet[1425]: I0212 20:28:39.872571 1425 topology_manager.go:215] "Topology Admit Handler" podUID="426232df-6cac-453a-9681-dcdbf564c716" podNamespace="default" podName="nfs-server-provisioner-0" Feb 12 20:28:39.876343 systemd[1]: Created slice kubepods-besteffort-pod426232df_6cac_453a_9681_dcdbf564c716.slice. Feb 12 20:28:39.883203 kubelet[1425]: I0212 20:28:39.883169 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d2hr2\" (UniqueName: \"kubernetes.io/projected/426232df-6cac-453a-9681-dcdbf564c716-kube-api-access-d2hr2\") pod \"nfs-server-provisioner-0\" (UID: \"426232df-6cac-453a-9681-dcdbf564c716\") " pod="default/nfs-server-provisioner-0" Feb 12 20:28:39.883203 kubelet[1425]: I0212 20:28:39.883209 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/426232df-6cac-453a-9681-dcdbf564c716-data\") pod \"nfs-server-provisioner-0\" (UID: \"426232df-6cac-453a-9681-dcdbf564c716\") " pod="default/nfs-server-provisioner-0" Feb 12 20:28:40.179792 env[1112]: time="2024-02-12T20:28:40.179736421Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:426232df-6cac-453a-9681-dcdbf564c716,Namespace:default,Attempt:0,}" Feb 12 20:28:40.286558 systemd-networkd[1022]: cali60e51b789ff: Link UP Feb 12 20:28:40.288415 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:28:40.288536 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 20:28:40.288491 systemd-networkd[1022]: cali60e51b789ff: Gained carrier Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.228 [INFO][2827] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 426232df-6cac-453a-9681-dcdbf564c716 987 0 2024-02-12 20:28:39 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.120 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.228 [INFO][2827] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.251 [INFO][2842] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" HandleID="k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.261 [INFO][2842] ipam_plugin.go 268: Auto assigning IP ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" HandleID="k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000cd3a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 20:28:40.251418427 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.261 [INFO][2842] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.261 [INFO][2842] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.261 [INFO][2842] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.263 [INFO][2842] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.266 [INFO][2842] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.270 [INFO][2842] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.272 [INFO][2842] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.274 [INFO][2842] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.274 [INFO][2842] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.275 [INFO][2842] ipam.go 1682: Creating new handle: k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30 Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.278 [INFO][2842] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.282 [INFO][2842] ipam.go 1216: Successfully claimed IPs: [192.168.77.67/26] block=192.168.77.64/26 handle="k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.282 [INFO][2842] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.67/26] handle="k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" host="10.0.0.120" Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.282 [INFO][2842] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:40.298258 env[1112]: 2024-02-12 20:28:40.282 [INFO][2842] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.67/26] IPv6=[] ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" HandleID="k8s-pod-network.bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:28:40.299116 env[1112]: 2024-02-12 20:28:40.284 [INFO][2827] k8s.go 385: Populated endpoint ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"426232df-6cac-453a-9681-dcdbf564c716", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.77.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:40.299116 env[1112]: 2024-02-12 20:28:40.284 [INFO][2827] k8s.go 386: Calico CNI using IPs: [192.168.77.67/32] ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:28:40.299116 env[1112]: 2024-02-12 20:28:40.284 [INFO][2827] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:28:40.299116 env[1112]: 2024-02-12 20:28:40.289 [INFO][2827] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:28:40.299317 env[1112]: 2024-02-12 20:28:40.289 [INFO][2827] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"426232df-6cac-453a-9681-dcdbf564c716", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.77.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"86:07:a1:74:5b:7d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:40.299317 env[1112]: 2024-02-12 20:28:40.296 [INFO][2827] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:28:40.310441 env[1112]: time="2024-02-12T20:28:40.310370011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:40.310700 env[1112]: time="2024-02-12T20:28:40.310414425Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:40.310700 env[1112]: time="2024-02-12T20:28:40.310426874Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:40.310700 env[1112]: time="2024-02-12T20:28:40.310612547Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30 pid=2875 runtime=io.containerd.runc.v2 Feb 12 20:28:40.309000 audit[2874]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:40.309000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffc8dd643c0 a2=0 a3=7ffc8dd643ac items=0 ppid=2203 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.309000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:40.329073 systemd[1]: Started cri-containerd-bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30.scope. Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.336000 audit: BPF prog-id=106 op=LOAD Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2875 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646563386638383930373339333731623132356262646638653135 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2875 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646563386638383930373339333731623132356262646638653135 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit: BPF prog-id=107 op=LOAD Feb 12 20:28:40.337000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00035c9d0 items=0 ppid=2875 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646563386638383930373339333731623132356262646638653135 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit: BPF prog-id=108 op=LOAD Feb 12 20:28:40.337000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00035ca18 items=0 ppid=2875 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646563386638383930373339333731623132356262646638653135 Feb 12 20:28:40.337000 audit: BPF prog-id=108 op=UNLOAD Feb 12 20:28:40.337000 audit: BPF prog-id=107 op=UNLOAD Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { perfmon } for pid=2886 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit[2886]: AVC avc: denied { bpf } for pid=2886 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:40.337000 audit: BPF prog-id=109 op=LOAD Feb 12 20:28:40.337000 audit[2886]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00035ce28 items=0 ppid=2875 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:40.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262646563386638383930373339333731623132356262646638653135 Feb 12 20:28:40.339027 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:40.357396 env[1112]: time="2024-02-12T20:28:40.357358334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:426232df-6cac-453a-9681-dcdbf564c716,Namespace:default,Attempt:0,} returns sandbox id \"bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30\"" Feb 12 20:28:40.359052 env[1112]: time="2024-02-12T20:28:40.359014627Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 20:28:40.848484 kubelet[1425]: E0212 20:28:40.848432 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:40.994241 systemd[1]: run-containerd-runc-k8s.io-bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30-runc.SecbBZ.mount: Deactivated successfully. Feb 12 20:28:41.566298 systemd-networkd[1022]: cali60e51b789ff: Gained IPv6LL Feb 12 20:28:41.849435 kubelet[1425]: E0212 20:28:41.849320 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:42.764919 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4217508045.mount: Deactivated successfully. Feb 12 20:28:42.850320 kubelet[1425]: E0212 20:28:42.850281 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:43.851289 kubelet[1425]: E0212 20:28:43.851241 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:44.851553 kubelet[1425]: E0212 20:28:44.851517 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:45.183828 env[1112]: time="2024-02-12T20:28:45.183778060Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:45.185469 env[1112]: time="2024-02-12T20:28:45.185421081Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:45.186803 env[1112]: time="2024-02-12T20:28:45.186786241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:45.188183 env[1112]: time="2024-02-12T20:28:45.188163877Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:28:45.188691 env[1112]: time="2024-02-12T20:28:45.188662575Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 20:28:45.190164 env[1112]: time="2024-02-12T20:28:45.190119831Z" level=info msg="CreateContainer within sandbox \"bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 20:28:45.200975 env[1112]: time="2024-02-12T20:28:45.200928771Z" level=info msg="CreateContainer within sandbox \"bbdec8f8890739371b125bbdf8e15bb906fc8b26f5a78ecdb7e3009d45355b30\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"906a58cac1cdcd30d7ec528674cb7405128011759b9ad21f984a6e9440545bed\"" Feb 12 20:28:45.201249 env[1112]: time="2024-02-12T20:28:45.201226026Z" level=info msg="StartContainer for \"906a58cac1cdcd30d7ec528674cb7405128011759b9ad21f984a6e9440545bed\"" Feb 12 20:28:45.220157 systemd[1]: Started cri-containerd-906a58cac1cdcd30d7ec528674cb7405128011759b9ad21f984a6e9440545bed.scope. Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.230564 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 12 20:28:45.230633 kernel: audit: type=1400 audit(1707769725.228:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.234435 kernel: audit: type=1400 audit(1707769725.228:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.234490 kernel: audit: type=1400 audit(1707769725.228:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.236319 kernel: audit: type=1400 audit(1707769725.228:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238258 kernel: audit: type=1400 audit(1707769725.228:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.240209 kernel: audit: type=1400 audit(1707769725.228:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.242135 kernel: audit: type=1400 audit(1707769725.228:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.246016 kernel: audit: type=1400 audit(1707769725.228:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.246065 kernel: audit: type=1400 audit(1707769725.228:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.247908 kernel: audit: type=1400 audit(1707769725.232:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit: BPF prog-id=110 op=LOAD Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2875 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:45.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930366135386361633163646364333064376563353238363734636237 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2875 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:45.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930366135386361633163646364333064376563353238363734636237 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.232000 audit: BPF prog-id=111 op=LOAD Feb 12 20:28:45.232000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003e0020 items=0 ppid=2875 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:45.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930366135386361633163646364333064376563353238363734636237 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.238000 audit: BPF prog-id=112 op=LOAD Feb 12 20:28:45.238000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003e0068 items=0 ppid=2875 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:45.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930366135386361633163646364333064376563353238363734636237 Feb 12 20:28:45.241000 audit: BPF prog-id=112 op=UNLOAD Feb 12 20:28:45.241000 audit: BPF prog-id=111 op=UNLOAD Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:45.241000 audit: BPF prog-id=113 op=LOAD Feb 12 20:28:45.241000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e0478 items=0 ppid=2875 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:45.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930366135386361633163646364333064376563353238363734636237 Feb 12 20:28:45.259054 env[1112]: time="2024-02-12T20:28:45.259013223Z" level=info msg="StartContainer for \"906a58cac1cdcd30d7ec528674cb7405128011759b9ad21f984a6e9440545bed\" returns successfully" Feb 12 20:28:45.294000 audit[2951]: AVC avc: denied { search } for pid=2951 comm="rpcbind" name="crypto" dev="proc" ino=22337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:28:45.294000 audit[2951]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f11603c50c0 a2=0 a3=0 items=0 ppid=2933 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 key=(null) Feb 12 20:28:45.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 20:28:45.324000 audit[2958]: AVC avc: denied { search } for pid=2958 comm="dbus-daemon" name="crypto" dev="proc" ino=22337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:28:45.324000 audit[2958]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb387a6e0c0 a2=0 a3=0 items=0 ppid=2933 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 key=(null) Feb 12 20:28:45.324000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 20:28:45.327000 audit[2959]: AVC avc: denied { watch } for pid=2959 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c771,c922 tclass=dir permissive=0 Feb 12 20:28:45.327000 audit[2959]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5590f83c47e0 a2=2c8 a3=7ffdb910efdc items=0 ppid=2933 pid=2959 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 key=(null) Feb 12 20:28:45.327000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 20:28:45.330000 audit[2960]: AVC avc: denied { read } for pid=2960 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25607 scontext=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 20:28:45.330000 audit[2960]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f8b1d0cf320 a1=80000 a2=d a3=7fff8f96c090 items=0 ppid=2933 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 key=(null) Feb 12 20:28:45.330000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 20:28:45.330000 audit[2960]: AVC avc: denied { search } for pid=2960 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:28:45.330000 audit[2960]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f8b1c6230c0 a2=0 a3=0 items=0 ppid=2933 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c771,c922 key=(null) Feb 12 20:28:45.330000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 20:28:45.852133 kubelet[1425]: E0212 20:28:45.852100 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:46.103209 kubelet[1425]: I0212 20:28:46.103096 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.2727437999999998 podCreationTimestamp="2024-02-12 20:28:39 +0000 UTC" firstStartedPulling="2024-02-12 20:28:40.358588343 +0000 UTC m=+45.863873998" lastFinishedPulling="2024-02-12 20:28:45.188900939 +0000 UTC m=+50.694186594" observedRunningTime="2024-02-12 20:28:46.102971688 +0000 UTC m=+51.608257353" watchObservedRunningTime="2024-02-12 20:28:46.103056396 +0000 UTC m=+51.608342051" Feb 12 20:28:46.111000 audit[2977]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:46.111000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdda804320 a2=0 a3=7ffdda80430c items=0 ppid=1627 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:46.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:46.114000 audit[2977]: NETFILTER_CFG table=nat:85 family=2 entries=104 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:46.114000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffdda804320 a2=0 a3=7ffdda80430c items=0 ppid=1627 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:46.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:46.853025 kubelet[1425]: E0212 20:28:46.852966 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:47.853986 kubelet[1425]: E0212 20:28:47.853930 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:48.854110 kubelet[1425]: E0212 20:28:48.854049 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:49.854829 kubelet[1425]: E0212 20:28:49.854770 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:50.855738 kubelet[1425]: E0212 20:28:50.855694 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:51.856419 kubelet[1425]: E0212 20:28:51.856352 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:52.856694 kubelet[1425]: E0212 20:28:52.856636 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:53.856986 kubelet[1425]: E0212 20:28:53.856928 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:54.627000 audit[2984]: NETFILTER_CFG table=filter:86 family=2 entries=9 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:54.632139 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 20:28:54.632286 kernel: audit: type=1325 audit(1707769734.627:817): table=filter:86 family=2 entries=9 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:54.632311 kernel: audit: type=1300 audit(1707769734.627:817): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc34bee210 a2=0 a3=7ffc34bee1fc items=0 ppid=1627 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:54.627000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc34bee210 a2=0 a3=7ffc34bee1fc items=0 ppid=1627 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:54.635383 kernel: audit: type=1327 audit(1707769734.627:817): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:54.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:54.629000 audit[2984]: NETFILTER_CFG table=nat:87 family=2 entries=44 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:54.629000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc34bee210 a2=0 a3=7ffc34bee1fc items=0 ppid=1627 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:54.644434 kernel: audit: type=1325 audit(1707769734.629:818): table=nat:87 family=2 entries=44 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:54.644539 kernel: audit: type=1300 audit(1707769734.629:818): arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc34bee210 a2=0 a3=7ffc34bee1fc items=0 ppid=1627 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:54.644567 kernel: audit: type=1327 audit(1707769734.629:818): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:54.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:54.646973 kubelet[1425]: I0212 20:28:54.646938 1425 topology_manager.go:215] "Topology Admit Handler" podUID="e4d120ca-cf63-4ec0-a619-11a9f5074d33" podNamespace="calico-apiserver" podName="calico-apiserver-7c88768d9-tgrqb" Feb 12 20:28:54.645000 audit[2986]: NETFILTER_CFG table=filter:88 family=2 entries=10 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:54.645000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffefcc6c840 a2=0 a3=7ffefcc6c82c items=0 ppid=1627 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:54.651732 systemd[1]: Created slice kubepods-besteffort-pode4d120ca_cf63_4ec0_a619_11a9f5074d33.slice. Feb 12 20:28:54.652931 kubelet[1425]: I0212 20:28:54.652837 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e4d120ca-cf63-4ec0-a619-11a9f5074d33-calico-apiserver-certs\") pod \"calico-apiserver-7c88768d9-tgrqb\" (UID: \"e4d120ca-cf63-4ec0-a619-11a9f5074d33\") " pod="calico-apiserver/calico-apiserver-7c88768d9-tgrqb" Feb 12 20:28:54.653035 kubelet[1425]: I0212 20:28:54.652960 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xqxgv\" (UniqueName: \"kubernetes.io/projected/e4d120ca-cf63-4ec0-a619-11a9f5074d33-kube-api-access-xqxgv\") pod \"calico-apiserver-7c88768d9-tgrqb\" (UID: \"e4d120ca-cf63-4ec0-a619-11a9f5074d33\") " pod="calico-apiserver/calico-apiserver-7c88768d9-tgrqb" Feb 12 20:28:54.654824 kernel: audit: type=1325 audit(1707769734.645:819): table=filter:88 family=2 entries=10 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:54.654878 kernel: audit: type=1300 audit(1707769734.645:819): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffefcc6c840 a2=0 a3=7ffefcc6c82c items=0 ppid=1627 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:54.654899 kernel: audit: type=1327 audit(1707769734.645:819): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:54.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:54.648000 audit[2986]: NETFILTER_CFG table=nat:89 family=2 entries=44 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:54.648000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffefcc6c840 a2=0 a3=7ffefcc6c82c items=0 ppid=1627 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:54.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:28:54.660025 kernel: audit: type=1325 audit(1707769734.648:820): table=nat:89 family=2 entries=44 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:28:54.753615 kubelet[1425]: E0212 20:28:54.753575 1425 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 20:28:54.753812 kubelet[1425]: E0212 20:28:54.753667 1425 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e4d120ca-cf63-4ec0-a619-11a9f5074d33-calico-apiserver-certs podName:e4d120ca-cf63-4ec0-a619-11a9f5074d33 nodeName:}" failed. No retries permitted until 2024-02-12 20:28:55.253644406 +0000 UTC m=+60.758930061 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e4d120ca-cf63-4ec0-a619-11a9f5074d33-calico-apiserver-certs") pod "calico-apiserver-7c88768d9-tgrqb" (UID: "e4d120ca-cf63-4ec0-a619-11a9f5074d33") : secret "calico-apiserver-certs" not found Feb 12 20:28:54.818636 kubelet[1425]: E0212 20:28:54.818598 1425 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:54.825321 env[1112]: time="2024-02-12T20:28:54.825292417Z" level=info msg="StopPodSandbox for \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\"" Feb 12 20:28:54.858020 kubelet[1425]: E0212 20:28:54.857952 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.854 [WARNING][3003] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--2fgql-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"db2a6781-a9c3-49b8-96ef-9701953605c5", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723", Pod:"csi-node-driver-2fgql", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali90e0e78114b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.854 [INFO][3003] k8s.go 578: Cleaning up netns ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.854 [INFO][3003] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" iface="eth0" netns="" Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.854 [INFO][3003] k8s.go 585: Releasing IP address(es) ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.854 [INFO][3003] utils.go 188: Calico CNI releasing IP address ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.869 [INFO][3010] ipam_plugin.go 415: Releasing address using handleID ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.870 [INFO][3010] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.870 [INFO][3010] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.877 [WARNING][3010] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.877 [INFO][3010] ipam_plugin.go 443: Releasing address using workloadID ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.879 [INFO][3010] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:54.881390 env[1112]: 2024-02-12 20:28:54.880 [INFO][3003] k8s.go 591: Teardown processing complete. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:54.881945 env[1112]: time="2024-02-12T20:28:54.881378407Z" level=info msg="TearDown network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\" successfully" Feb 12 20:28:54.881945 env[1112]: time="2024-02-12T20:28:54.881411377Z" level=info msg="StopPodSandbox for \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\" returns successfully" Feb 12 20:28:54.882325 env[1112]: time="2024-02-12T20:28:54.882301196Z" level=info msg="RemovePodSandbox for \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\"" Feb 12 20:28:54.882386 env[1112]: time="2024-02-12T20:28:54.882329648Z" level=info msg="Forcibly stopping sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\"" Feb 12 20:28:54.909431 kubelet[1425]: I0212 20:28:54.909388 1425 topology_manager.go:215] "Topology Admit Handler" podUID="f72c0f29-5991-4b47-b11a-40e7ea380e92" podNamespace="default" podName="test-pod-1" Feb 12 20:28:54.914968 systemd[1]: Created slice kubepods-besteffort-podf72c0f29_5991_4b47_b11a_40e7ea380e92.slice. Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.925 [WARNING][3035] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--2fgql-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"db2a6781-a9c3-49b8-96ef-9701953605c5", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 27, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"7b5fabef42e1fc9ee7736de3103b25afba9e3e32b471b6018ba7ef211d314723", Pod:"csi-node-driver-2fgql", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali90e0e78114b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.925 [INFO][3035] k8s.go 578: Cleaning up netns ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.925 [INFO][3035] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" iface="eth0" netns="" Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.925 [INFO][3035] k8s.go 585: Releasing IP address(es) ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.925 [INFO][3035] utils.go 188: Calico CNI releasing IP address ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.946 [INFO][3042] ipam_plugin.go 415: Releasing address using handleID ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.946 [INFO][3042] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.946 [INFO][3042] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.955 [WARNING][3042] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.955 [INFO][3042] ipam_plugin.go 443: Releasing address using workloadID ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" HandleID="k8s-pod-network.efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Workload="10.0.0.120-k8s-csi--node--driver--2fgql-eth0" Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.957 [INFO][3042] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:54.959569 env[1112]: 2024-02-12 20:28:54.958 [INFO][3035] k8s.go 591: Teardown processing complete. ContainerID="efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231" Feb 12 20:28:54.960030 env[1112]: time="2024-02-12T20:28:54.959611876Z" level=info msg="TearDown network for sandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\" successfully" Feb 12 20:28:54.962506 env[1112]: time="2024-02-12T20:28:54.962457551Z" level=info msg="RemovePodSandbox \"efdffeb77b7b7a6ed4e1d4367f64c3c421535384b8dede27fb60674abc28b231\" returns successfully" Feb 12 20:28:54.963159 env[1112]: time="2024-02-12T20:28:54.963131289Z" level=info msg="StopPodSandbox for \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\"" Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:54.997 [WARNING][3064] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4fc52dc2-2827-421e-978c-0c3f1bae1b4b", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264", Pod:"nginx-deployment-6d5f899847-zz696", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali28d4a320122", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:54.997 [INFO][3064] k8s.go 578: Cleaning up netns ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:54.997 [INFO][3064] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" iface="eth0" netns="" Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:54.997 [INFO][3064] k8s.go 585: Releasing IP address(es) ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:54.997 [INFO][3064] utils.go 188: Calico CNI releasing IP address ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:55.016 [INFO][3074] ipam_plugin.go 415: Releasing address using handleID ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:55.017 [INFO][3074] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:55.017 [INFO][3074] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:55.024 [WARNING][3074] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:55.024 [INFO][3074] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:55.026 [INFO][3074] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:55.028387 env[1112]: 2024-02-12 20:28:55.027 [INFO][3064] k8s.go 591: Teardown processing complete. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:55.028932 env[1112]: time="2024-02-12T20:28:55.028441981Z" level=info msg="TearDown network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\" successfully" Feb 12 20:28:55.028932 env[1112]: time="2024-02-12T20:28:55.028472687Z" level=info msg="StopPodSandbox for \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\" returns successfully" Feb 12 20:28:55.028988 env[1112]: time="2024-02-12T20:28:55.028947546Z" level=info msg="RemovePodSandbox for \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\"" Feb 12 20:28:55.029069 env[1112]: time="2024-02-12T20:28:55.028981117Z" level=info msg="Forcibly stopping sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\"" Feb 12 20:28:55.055504 kubelet[1425]: I0212 20:28:55.055351 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ndx86\" (UniqueName: \"kubernetes.io/projected/f72c0f29-5991-4b47-b11a-40e7ea380e92-kube-api-access-ndx86\") pod \"test-pod-1\" (UID: \"f72c0f29-5991-4b47-b11a-40e7ea380e92\") " pod="default/test-pod-1" Feb 12 20:28:55.055504 kubelet[1425]: I0212 20:28:55.055425 1425 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-c15635dd-2a3c-4f42-ad70-726fcf1bb025\" (UniqueName: \"kubernetes.io/nfs/f72c0f29-5991-4b47-b11a-40e7ea380e92-pvc-c15635dd-2a3c-4f42-ad70-726fcf1bb025\") pod \"test-pod-1\" (UID: \"f72c0f29-5991-4b47-b11a-40e7ea380e92\") " pod="default/test-pod-1" Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.063 [WARNING][3096] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"4fc52dc2-2827-421e-978c-0c3f1bae1b4b", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"accef8d7042b0ef3dd471a90e33a0937ad0c7f683f23a22eeffba694e9161264", Pod:"nginx-deployment-6d5f899847-zz696", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali28d4a320122", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.063 [INFO][3096] k8s.go 578: Cleaning up netns ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.064 [INFO][3096] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" iface="eth0" netns="" Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.064 [INFO][3096] k8s.go 585: Releasing IP address(es) ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.064 [INFO][3096] utils.go 188: Calico CNI releasing IP address ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.087 [INFO][3103] ipam_plugin.go 415: Releasing address using handleID ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.087 [INFO][3103] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.087 [INFO][3103] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.095 [WARNING][3103] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.095 [INFO][3103] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" HandleID="k8s-pod-network.eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--zz696-eth0" Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.097 [INFO][3103] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:55.100341 env[1112]: 2024-02-12 20:28:55.098 [INFO][3096] k8s.go 591: Teardown processing complete. ContainerID="eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34" Feb 12 20:28:55.100915 env[1112]: time="2024-02-12T20:28:55.100390498Z" level=info msg="TearDown network for sandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\" successfully" Feb 12 20:28:55.103684 env[1112]: time="2024-02-12T20:28:55.103619634Z" level=info msg="RemovePodSandbox \"eaa567312ec52ff6a67525d42ea447ec84e2db428f1ee565f62c310b1ee16f34\" returns successfully" Feb 12 20:28:55.164000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.169240 kernel: Failed to create system directory netfs Feb 12 20:28:55.169288 kernel: Failed to create system directory netfs Feb 12 20:28:55.169314 kernel: Failed to create system directory netfs Feb 12 20:28:55.169334 kernel: Failed to create system directory netfs Feb 12 20:28:55.164000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.164000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.164000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.164000 audit[3115]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f8aa9285e0 a1=153bc a2=55f8a9ad72b0 a3=5 items=0 ppid=70 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.164000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.179346 kernel: Failed to create system directory fscache Feb 12 20:28:55.179437 kernel: Failed to create system directory fscache Feb 12 20:28:55.179467 kernel: Failed to create system directory fscache Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.180396 kernel: Failed to create system directory fscache Feb 12 20:28:55.180418 kernel: Failed to create system directory fscache Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.181442 kernel: Failed to create system directory fscache Feb 12 20:28:55.181498 kernel: Failed to create system directory fscache Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.182523 kernel: Failed to create system directory fscache Feb 12 20:28:55.182559 kernel: Failed to create system directory fscache Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.184139 kernel: Failed to create system directory fscache Feb 12 20:28:55.184178 kernel: Failed to create system directory fscache Feb 12 20:28:55.184200 kernel: Failed to create system directory fscache Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.185255 kernel: Failed to create system directory fscache Feb 12 20:28:55.185301 kernel: Failed to create system directory fscache Feb 12 20:28:55.175000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.175000 audit[3115]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f8aab3d9c0 a1=4c0fc a2=55f8a9ad72b0 a3=5 items=0 ppid=70 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.175000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:28:55.188019 kernel: FS-Cache: Loaded Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.218539 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.218616 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.218633 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.220399 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.220452 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.220476 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.222329 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.222358 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.222381 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.223557 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.223600 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.225422 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.225457 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.225479 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.227280 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.227313 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.227329 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.228539 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.228587 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.229191 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.230457 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.230505 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.232429 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.232458 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.232474 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.234380 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.234412 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.234432 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.236234 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.236264 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.236277 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.237462 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.237571 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.239291 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.239317 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.239332 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.240451 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.240489 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.242359 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.242416 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.242432 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.243613 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.243650 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.245516 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.245540 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.245555 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.247353 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.247383 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.247399 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.248585 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.248614 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.250430 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.250451 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.250464 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.252321 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.252345 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.252364 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.253579 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.253610 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.255410 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.255432 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.255451 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.256561 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.256593 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.258349 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.258405 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.258424 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.261772 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.261818 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.261839 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.261860 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.262510 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.262539 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.264098 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.264150 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.264188 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.289333 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.289386 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.289401 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.290391 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.290408 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.291435 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.291452 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.292474 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.293016 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.293038 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.294042 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.294065 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.295091 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.295120 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.296150 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.296172 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.297239 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.297266 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.298281 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.298311 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.299311 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.299332 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.300333 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.300359 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.301361 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.301381 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.302378 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.302400 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.303400 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.303421 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.304475 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.304497 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.306053 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.306092 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.306124 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.307135 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.307180 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.308171 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.308194 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.309203 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.309220 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.310223 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.310246 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.311244 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.312291 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.312309 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.312322 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.313324 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.313348 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.206000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.314359 kernel: Failed to create system directory sunrpc Feb 12 20:28:55.322133 kernel: RPC: Registered named UNIX socket transport module. Feb 12 20:28:55.322171 kernel: RPC: Registered udp transport module. Feb 12 20:28:55.322188 kernel: RPC: Registered tcp transport module. Feb 12 20:28:55.323280 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 20:28:55.206000 audit[3115]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f8aab89ad0 a1=1588c4 a2=55f8a9ad72b0 a3=5 items=6 ppid=70 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.206000 audit: CWD cwd="/" Feb 12 20:28:55.206000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:55.206000 audit: PATH item=1 name=(null) inode=25751 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:55.206000 audit: PATH item=2 name=(null) inode=25751 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:55.206000 audit: PATH item=3 name=(null) inode=25752 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:55.206000 audit: PATH item=4 name=(null) inode=25751 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:55.206000 audit: PATH item=5 name=(null) inode=25753 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:28:55.206000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.352100 kernel: Failed to create system directory nfs Feb 12 20:28:55.352149 kernel: Failed to create system directory nfs Feb 12 20:28:55.352175 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.353142 kernel: Failed to create system directory nfs Feb 12 20:28:55.353172 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.354151 kernel: Failed to create system directory nfs Feb 12 20:28:55.354179 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.355173 kernel: Failed to create system directory nfs Feb 12 20:28:55.355212 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.356190 kernel: Failed to create system directory nfs Feb 12 20:28:55.356244 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.357254 kernel: Failed to create system directory nfs Feb 12 20:28:55.357285 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.358294 kernel: Failed to create system directory nfs Feb 12 20:28:55.358359 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.359294 kernel: Failed to create system directory nfs Feb 12 20:28:55.359334 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.360333 kernel: Failed to create system directory nfs Feb 12 20:28:55.360369 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.361312 kernel: Failed to create system directory nfs Feb 12 20:28:55.361349 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.362324 kernel: Failed to create system directory nfs Feb 12 20:28:55.362361 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.363402 kernel: Failed to create system directory nfs Feb 12 20:28:55.363437 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.364495 kernel: Failed to create system directory nfs Feb 12 20:28:55.364537 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.366233 kernel: Failed to create system directory nfs Feb 12 20:28:55.366276 kernel: Failed to create system directory nfs Feb 12 20:28:55.366299 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.367381 kernel: Failed to create system directory nfs Feb 12 20:28:55.367422 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.368370 kernel: Failed to create system directory nfs Feb 12 20:28:55.368427 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.369366 kernel: Failed to create system directory nfs Feb 12 20:28:55.369403 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.370369 kernel: Failed to create system directory nfs Feb 12 20:28:55.370398 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.372153 kernel: Failed to create system directory nfs Feb 12 20:28:55.372185 kernel: Failed to create system directory nfs Feb 12 20:28:55.372201 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.373190 kernel: Failed to create system directory nfs Feb 12 20:28:55.373229 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.374431 kernel: Failed to create system directory nfs Feb 12 20:28:55.374469 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.376311 kernel: Failed to create system directory nfs Feb 12 20:28:55.376366 kernel: Failed to create system directory nfs Feb 12 20:28:55.376385 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.377451 kernel: Failed to create system directory nfs Feb 12 20:28:55.377495 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.378453 kernel: Failed to create system directory nfs Feb 12 20:28:55.378490 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.379442 kernel: Failed to create system directory nfs Feb 12 20:28:55.379485 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.381090 kernel: Failed to create system directory nfs Feb 12 20:28:55.381145 kernel: Failed to create system directory nfs Feb 12 20:28:55.381173 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.382067 kernel: Failed to create system directory nfs Feb 12 20:28:55.382137 kernel: Failed to create system directory nfs Feb 12 20:28:55.344000 audit[3115]: AVC avc: denied { confidentiality } for pid=3115 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.344000 audit[3115]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f8aad2c680 a1=e29dc a2=55f8a9ad72b0 a3=5 items=0 ppid=70 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.344000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:28:55.396028 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.430281 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.430341 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.430369 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.432831 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.432880 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.434422 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.434448 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.434463 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.437332 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.437444 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.437465 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.438400 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.438448 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.439381 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.439418 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.440374 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.440418 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.442286 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.442325 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.442348 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.443420 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.443460 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.444514 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.444544 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.446508 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.446549 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.446577 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.448179 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.448217 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.448250 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.449187 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.449230 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.450154 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.450183 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.451134 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.451163 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.452088 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.452125 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.453054 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.453084 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.454016 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.454045 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.455438 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.455477 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.455495 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.456428 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.456472 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.457414 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.457437 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.458546 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.458615 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.460380 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.460399 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.460413 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.462359 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.462387 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.462404 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.463342 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.463365 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.464419 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.464439 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.465511 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.465533 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.467066 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.467102 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.467115 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.468054 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.468098 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.469042 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.469066 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.470200 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.470273 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.471365 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.471395 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.472353 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.472437 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.473384 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.473442 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.474562 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.474594 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.476466 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.476512 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.476532 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.478357 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.478400 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.478420 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.480448 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.480473 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.480497 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.480510 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.482290 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.482314 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.482332 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.417000 audit[3123]: AVC avc: denied { confidentiality } for pid=3123 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.483457 kernel: Failed to create system directory nfs4 Feb 12 20:28:55.554635 env[1112]: time="2024-02-12T20:28:55.554588711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c88768d9-tgrqb,Uid:e4d120ca-cf63-4ec0-a619-11a9f5074d33,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:28:55.640424 kernel: NFS: Registering the id_resolver key type Feb 12 20:28:55.640550 kernel: Key type id_resolver registered Feb 12 20:28:55.640609 kernel: Key type id_legacy registered Feb 12 20:28:55.417000 audit[3123]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fcc9a653010 a1=1d3cc4 a2=55a07ccb92b0 a3=5 items=0 ppid=70 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.417000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.650345 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.650374 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.650392 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.650405 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.651356 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.651397 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.652449 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.652493 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.653536 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.653573 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.655662 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.655710 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.655759 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:28:55.655450 systemd-networkd[1022]: calid6c0c8ca975: Link UP Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.656214 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.656246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid6c0c8ca975: link becomes ready Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.657490 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.658333 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.657840 systemd-networkd[1022]: calid6c0c8ca975: Gained carrier Feb 12 20:28:55.658497 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.659585 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.659617 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.661104 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.661125 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.661138 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.664219 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.664250 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.664278 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.664300 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.645000 audit[3147]: AVC avc: denied { confidentiality } for pid=3147 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:28:55.665316 kernel: Failed to create system directory rpcgss Feb 12 20:28:55.645000 audit[3147]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7c1ce96010 a1=4f524 a2=555e71cd72b0 a3=5 items=0 ppid=70 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.645000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.596 [INFO][3129] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0 calico-apiserver-7c88768d9- calico-apiserver e4d120ca-cf63-4ec0-a619-11a9f5074d33 1090 0 2024-02-12 20:28:54 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7c88768d9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.120 calico-apiserver-7c88768d9-tgrqb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid6c0c8ca975 [] []}} ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Namespace="calico-apiserver" Pod="calico-apiserver-7c88768d9-tgrqb" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.596 [INFO][3129] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Namespace="calico-apiserver" Pod="calico-apiserver-7c88768d9-tgrqb" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.620 [INFO][3138] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" HandleID="k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Workload="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.630 [INFO][3138] ipam_plugin.go 268: Auto assigning IP ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" HandleID="k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Workload="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029fb70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.120", "pod":"calico-apiserver-7c88768d9-tgrqb", "timestamp":"2024-02-12 20:28:55.620819331 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.630 [INFO][3138] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.630 [INFO][3138] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.630 [INFO][3138] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.632 [INFO][3138] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.635 [INFO][3138] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.638 [INFO][3138] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.640 [INFO][3138] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.642 [INFO][3138] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.642 [INFO][3138] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.643 [INFO][3138] ipam.go 1682: Creating new handle: k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90 Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.647 [INFO][3138] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.652 [INFO][3138] ipam.go 1216: Successfully claimed IPs: [192.168.77.68/26] block=192.168.77.64/26 handle="k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.652 [INFO][3138] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.68/26] handle="k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" host="10.0.0.120" Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.652 [INFO][3138] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:55.669926 env[1112]: 2024-02-12 20:28:55.652 [INFO][3138] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.68/26] IPv6=[] ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" HandleID="k8s-pod-network.d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Workload="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" Feb 12 20:28:55.670681 env[1112]: 2024-02-12 20:28:55.654 [INFO][3129] k8s.go 385: Populated endpoint ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Namespace="calico-apiserver" Pod="calico-apiserver-7c88768d9-tgrqb" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0", GenerateName:"calico-apiserver-7c88768d9-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4d120ca-cf63-4ec0-a619-11a9f5074d33", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c88768d9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"calico-apiserver-7c88768d9-tgrqb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.77.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid6c0c8ca975", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:55.670681 env[1112]: 2024-02-12 20:28:55.654 [INFO][3129] k8s.go 386: Calico CNI using IPs: [192.168.77.68/32] ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Namespace="calico-apiserver" Pod="calico-apiserver-7c88768d9-tgrqb" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" Feb 12 20:28:55.670681 env[1112]: 2024-02-12 20:28:55.654 [INFO][3129] dataplane_linux.go 68: Setting the host side veth name to calid6c0c8ca975 ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Namespace="calico-apiserver" Pod="calico-apiserver-7c88768d9-tgrqb" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" Feb 12 20:28:55.670681 env[1112]: 2024-02-12 20:28:55.657 [INFO][3129] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Namespace="calico-apiserver" Pod="calico-apiserver-7c88768d9-tgrqb" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" Feb 12 20:28:55.670681 env[1112]: 2024-02-12 20:28:55.662 [INFO][3129] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Namespace="calico-apiserver" Pod="calico-apiserver-7c88768d9-tgrqb" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0", GenerateName:"calico-apiserver-7c88768d9-", Namespace:"calico-apiserver", SelfLink:"", UID:"e4d120ca-cf63-4ec0-a619-11a9f5074d33", ResourceVersion:"1090", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7c88768d9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90", Pod:"calico-apiserver-7c88768d9-tgrqb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.77.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid6c0c8ca975", MAC:"9e:9c:1f:ce:fa:6a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:55.670681 env[1112]: 2024-02-12 20:28:55.668 [INFO][3129] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90" Namespace="calico-apiserver" Pod="calico-apiserver-7c88768d9-tgrqb" WorkloadEndpoint="10.0.0.120-k8s-calico--apiserver--7c88768d9--tgrqb-eth0" Feb 12 20:28:55.685000 audit[3192]: NETFILTER_CFG table=filter:90 family=2 entries=55 op=nft_register_chain pid=3192 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:55.685000 audit[3192]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7fffddf89730 a2=0 a3=7fffddf8971c items=0 ppid=2203 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.685000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:55.688245 env[1112]: time="2024-02-12T20:28:55.684425700Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:55.688245 env[1112]: time="2024-02-12T20:28:55.684463330Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:55.688245 env[1112]: time="2024-02-12T20:28:55.684472609Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:55.688245 env[1112]: time="2024-02-12T20:28:55.684622638Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90 pid=3182 runtime=io.containerd.runc.v2 Feb 12 20:28:55.690615 nfsidmap[3179]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 12 20:28:55.693933 nfsidmap[3203]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 12 20:28:55.695068 systemd[1]: Started cri-containerd-d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90.scope. Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit: BPF prog-id=114 op=LOAD Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653135326534303261366532653663356162326361313337323335 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653135326534303261366532653663356162326361313337323335 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit: BPF prog-id=115 op=LOAD Feb 12 20:28:55.707000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001dbec0 items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653135326534303261366532653663356162326361313337323335 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.707000 audit: BPF prog-id=116 op=LOAD Feb 12 20:28:55.707000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001dbf08 items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653135326534303261366532653663356162326361313337323335 Feb 12 20:28:55.708000 audit: BPF prog-id=116 op=UNLOAD Feb 12 20:28:55.708000 audit: BPF prog-id=115 op=UNLOAD Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.708000 audit: BPF prog-id=117 op=LOAD Feb 12 20:28:55.708000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c8318 items=0 ppid=3182 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653135326534303261366532653663356162326361313337323335 Feb 12 20:28:55.709724 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:55.731341 env[1112]: time="2024-02-12T20:28:55.731274367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7c88768d9-tgrqb,Uid:e4d120ca-cf63-4ec0-a619-11a9f5074d33,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90\"" Feb 12 20:28:55.732618 env[1112]: time="2024-02-12T20:28:55.732584983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:28:55.761000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2597 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:28:55.761000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5562ca7aea40 a2=10 a3=a417dab7c342a93f items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.761000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:28:55.761000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2597 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:28:55.761000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5562ca7aea40 a2=10 a3=a417dab7c342a93f items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.761000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:28:55.761000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2597 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:28:55.761000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5562ca7aea40 a2=10 a3=a417dab7c342a93f items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.761000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:28:55.761000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2597 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:28:55.761000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2597 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:28:55.761000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2597 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:28:55.818406 env[1112]: time="2024-02-12T20:28:55.818364520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f72c0f29-5991-4b47-b11a-40e7ea380e92,Namespace:default,Attempt:0,}" Feb 12 20:28:55.858603 kubelet[1425]: E0212 20:28:55.858552 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:55.936438 systemd-networkd[1022]: cali5ec59c6bf6e: Link UP Feb 12 20:28:55.937284 systemd-networkd[1022]: cali5ec59c6bf6e: Gained carrier Feb 12 20:28:55.938019 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.873 [INFO][3224] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-test--pod--1-eth0 default f72c0f29-5991-4b47-b11a-40e7ea380e92 1102 0 2024-02-12 20:28:40 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.873 [INFO][3224] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.896 [INFO][3239] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" HandleID="k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Workload="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.907 [INFO][3239] ipam_plugin.go 268: Auto assigning IP ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" HandleID="k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Workload="10.0.0.120-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002fb9c0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"test-pod-1", "timestamp":"2024-02-12 20:28:55.89606607 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.907 [INFO][3239] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.907 [INFO][3239] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.907 [INFO][3239] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.909 [INFO][3239] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.913 [INFO][3239] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.918 [INFO][3239] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.919 [INFO][3239] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.921 [INFO][3239] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.921 [INFO][3239] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.923 [INFO][3239] ipam.go 1682: Creating new handle: k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.927 [INFO][3239] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.933 [INFO][3239] ipam.go 1216: Successfully claimed IPs: [192.168.77.69/26] block=192.168.77.64/26 handle="k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.933 [INFO][3239] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.69/26] handle="k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" host="10.0.0.120" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.933 [INFO][3239] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.933 [INFO][3239] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.69/26] IPv6=[] ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" HandleID="k8s-pod-network.33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Workload="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.934 [INFO][3224] k8s.go 385: Populated endpoint ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f72c0f29-5991-4b47-b11a-40e7ea380e92", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:55.946696 env[1112]: 2024-02-12 20:28:55.934 [INFO][3224] k8s.go 386: Calico CNI using IPs: [192.168.77.69/32] ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 20:28:55.947544 env[1112]: 2024-02-12 20:28:55.934 [INFO][3224] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 20:28:55.947544 env[1112]: 2024-02-12 20:28:55.937 [INFO][3224] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 20:28:55.947544 env[1112]: 2024-02-12 20:28:55.937 [INFO][3224] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"f72c0f29-5991-4b47-b11a-40e7ea380e92", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 28, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"22:db:80:df:59:b0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:28:55.947544 env[1112]: 2024-02-12 20:28:55.943 [INFO][3224] k8s.go 491: Wrote updated endpoint to datastore ContainerID="33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 12 20:28:55.954000 audit[3261]: NETFILTER_CFG table=filter:91 family=2 entries=42 op=nft_register_chain pid=3261 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:28:55.954000 audit[3261]: SYSCALL arch=c000003e syscall=46 success=yes exit=20268 a0=3 a1=7ffd8c510e30 a2=0 a3=7ffd8c510e1c items=0 ppid=2203 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.954000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:28:55.957289 env[1112]: time="2024-02-12T20:28:55.957220896Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:28:55.957289 env[1112]: time="2024-02-12T20:28:55.957257765Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:28:55.957289 env[1112]: time="2024-02-12T20:28:55.957267937Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:28:55.957531 env[1112]: time="2024-02-12T20:28:55.957459173Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b pid=3269 runtime=io.containerd.runc.v2 Feb 12 20:28:55.974681 systemd[1]: Started cri-containerd-33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b.scope. Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit: BPF prog-id=118 op=LOAD Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=3269 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663933363035623639646562313763386139336163366134366232 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=3269 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663933363035623639646562313763386139336163366134366232 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit: BPF prog-id=119 op=LOAD Feb 12 20:28:55.987000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c0002113c0 items=0 ppid=3269 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663933363035623639646562313763386139336163366134366232 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit: BPF prog-id=120 op=LOAD Feb 12 20:28:55.987000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000211408 items=0 ppid=3269 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663933363035623639646562313763386139336163366134366232 Feb 12 20:28:55.987000 audit: BPF prog-id=120 op=UNLOAD Feb 12 20:28:55.987000 audit: BPF prog-id=119 op=UNLOAD Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:28:55.987000 audit: BPF prog-id=121 op=LOAD Feb 12 20:28:55.987000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000211818 items=0 ppid=3269 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:28:55.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333663933363035623639646562313763386139336163366134366232 Feb 12 20:28:55.989578 systemd-resolved[1065]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 20:28:56.013751 env[1112]: time="2024-02-12T20:28:56.013703889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:f72c0f29-5991-4b47-b11a-40e7ea380e92,Namespace:default,Attempt:0,} returns sandbox id \"33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b\"" Feb 12 20:28:56.858761 kubelet[1425]: E0212 20:28:56.858716 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:57.630186 systemd-networkd[1022]: calid6c0c8ca975: Gained IPv6LL Feb 12 20:28:57.859225 kubelet[1425]: E0212 20:28:57.859188 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:57.950201 systemd-networkd[1022]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 20:28:58.859856 kubelet[1425]: E0212 20:28:58.859814 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:28:59.860696 kubelet[1425]: E0212 20:28:59.860640 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:00.861016 kubelet[1425]: E0212 20:29:00.860951 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:01.635945 env[1112]: time="2024-02-12T20:29:01.635890908Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:29:01.637550 env[1112]: time="2024-02-12T20:29:01.637529306Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:29:01.638885 env[1112]: time="2024-02-12T20:29:01.638848548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:29:01.641201 env[1112]: time="2024-02-12T20:29:01.641166052Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:29:01.641966 env[1112]: time="2024-02-12T20:29:01.641918020Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 20:29:01.642918 env[1112]: time="2024-02-12T20:29:01.642886701Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 20:29:01.643750 env[1112]: time="2024-02-12T20:29:01.643724598Z" level=info msg="CreateContainer within sandbox \"d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:29:01.654758 env[1112]: time="2024-02-12T20:29:01.654716807Z" level=info msg="CreateContainer within sandbox \"d9e152e402a6e2e6c5ab2ca137235090b94fd831ffb8555910a902ebf928de90\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b54492635691874201e749054376cdbb23f0ea8578ec9350e84d1953e2c21208\"" Feb 12 20:29:01.655189 env[1112]: time="2024-02-12T20:29:01.655135861Z" level=info msg="StartContainer for \"b54492635691874201e749054376cdbb23f0ea8578ec9350e84d1953e2c21208\"" Feb 12 20:29:01.672175 systemd[1]: Started cri-containerd-b54492635691874201e749054376cdbb23f0ea8578ec9350e84d1953e2c21208.scope. Feb 12 20:29:01.695290 kernel: kauditd_printk_skb: 476 callbacks suppressed Feb 12 20:29:01.695472 kernel: audit: type=1400 audit(1707769741.682:871): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.695515 kernel: audit: type=1400 audit(1707769741.682:872): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.695534 kernel: audit: type=1400 audit(1707769741.682:873): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.695551 kernel: audit: type=1400 audit(1707769741.682:874): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.695572 kernel: audit: type=1400 audit(1707769741.682:875): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.695588 kernel: audit: type=1400 audit(1707769741.682:876): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.696908 kernel: audit: type=1400 audit(1707769741.682:877): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.700833 kernel: audit: type=1400 audit(1707769741.682:878): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.700883 kernel: audit: type=1400 audit(1707769741.682:879): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.706017 kernel: audit: type=1400 audit(1707769741.685:880): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit: BPF prog-id=122 op=LOAD Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3182 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:01.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343439323633353639313837343230316537343930353433373663 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3182 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:01.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343439323633353639313837343230316537343930353433373663 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.685000 audit: BPF prog-id=123 op=LOAD Feb 12 20:29:01.685000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000338250 items=0 ppid=3182 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:01.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343439323633353639313837343230316537343930353433373663 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.688000 audit: BPF prog-id=124 op=LOAD Feb 12 20:29:01.688000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000338298 items=0 ppid=3182 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:01.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343439323633353639313837343230316537343930353433373663 Feb 12 20:29:01.690000 audit: BPF prog-id=124 op=UNLOAD Feb 12 20:29:01.690000 audit: BPF prog-id=123 op=UNLOAD Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:01.690000 audit: BPF prog-id=125 op=LOAD Feb 12 20:29:01.690000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003386a8 items=0 ppid=3182 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:01.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235343439323633353639313837343230316537343930353433373663 Feb 12 20:29:01.729634 env[1112]: time="2024-02-12T20:29:01.725055902Z" level=info msg="StartContainer for \"b54492635691874201e749054376cdbb23f0ea8578ec9350e84d1953e2c21208\" returns successfully" Feb 12 20:29:01.775000 audit[3349]: NETFILTER_CFG table=filter:92 family=2 entries=10 op=nft_register_rule pid=3349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:29:01.775000 audit[3349]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc87dfc2c0 a2=0 a3=7ffc87dfc2ac items=0 ppid=1627 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:01.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:29:01.777000 audit[3349]: NETFILTER_CFG table=nat:93 family=2 entries=44 op=nft_register_rule pid=3349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:29:01.777000 audit[3349]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc87dfc2c0 a2=0 a3=7ffc87dfc2ac items=0 ppid=1627 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:01.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:29:01.861830 kubelet[1425]: E0212 20:29:01.861783 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:01.998000 audit[3327]: AVC avc: denied { watch } for pid=3327 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_28_55.1089911192/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c592,c731 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c592,c731 tclass=file permissive=0 Feb 12 20:29:01.998000 audit[3327]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000437be0 a2=fc6 a3=0 items=0 ppid=3182 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c592,c731 key=(null) Feb 12 20:29:01.998000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:29:02.050007 env[1112]: time="2024-02-12T20:29:02.049955055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:29:02.051943 env[1112]: time="2024-02-12T20:29:02.051906416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:29:02.053269 env[1112]: time="2024-02-12T20:29:02.053248498Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:29:02.054793 env[1112]: time="2024-02-12T20:29:02.054772318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:29:02.055301 env[1112]: time="2024-02-12T20:29:02.055262768Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 20:29:02.057005 env[1112]: time="2024-02-12T20:29:02.056963126Z" level=info msg="CreateContainer within sandbox \"33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 20:29:02.068364 env[1112]: time="2024-02-12T20:29:02.068332731Z" level=info msg="CreateContainer within sandbox \"33f93605b69deb17c8a93ac6a46b21d9c2ffee50f951df7f7866da62f4be3a5b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9734b43fcc7ff76a276b6e194924e2177bf9cb7b50ac99d1fa30d50943150e8a\"" Feb 12 20:29:02.068741 env[1112]: time="2024-02-12T20:29:02.068711438Z" level=info msg="StartContainer for \"9734b43fcc7ff76a276b6e194924e2177bf9cb7b50ac99d1fa30d50943150e8a\"" Feb 12 20:29:02.086794 systemd[1]: Started cri-containerd-9734b43fcc7ff76a276b6e194924e2177bf9cb7b50ac99d1fa30d50943150e8a.scope. Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit: BPF prog-id=126 op=LOAD Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3269 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:02.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937333462343366636337666637366132373662366531393439323465 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=3269 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:02.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937333462343366636337666637366132373662366531393439323465 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit: BPF prog-id=127 op=LOAD Feb 12 20:29:02.095000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0001e3bd0 items=0 ppid=3269 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:02.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937333462343366636337666637366132373662366531393439323465 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.095000 audit: BPF prog-id=128 op=LOAD Feb 12 20:29:02.095000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0001e3c18 items=0 ppid=3269 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:02.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937333462343366636337666637366132373662366531393439323465 Feb 12 20:29:02.096000 audit: BPF prog-id=128 op=UNLOAD Feb 12 20:29:02.096000 audit: BPF prog-id=127 op=UNLOAD Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:29:02.096000 audit: BPF prog-id=129 op=LOAD Feb 12 20:29:02.096000 audit[3357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000292028 items=0 ppid=3269 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:02.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937333462343366636337666637366132373662366531393439323465 Feb 12 20:29:02.109748 env[1112]: time="2024-02-12T20:29:02.109395260Z" level=info msg="StartContainer for \"9734b43fcc7ff76a276b6e194924e2177bf9cb7b50ac99d1fa30d50943150e8a\" returns successfully" Feb 12 20:29:02.133416 kubelet[1425]: I0212 20:29:02.133384 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.092752543 podCreationTimestamp="2024-02-12 20:28:40 +0000 UTC" firstStartedPulling="2024-02-12 20:28:56.014882466 +0000 UTC m=+61.520168121" lastFinishedPulling="2024-02-12 20:29:02.055482084 +0000 UTC m=+67.560767739" observedRunningTime="2024-02-12 20:29:02.132868545 +0000 UTC m=+67.638154191" watchObservedRunningTime="2024-02-12 20:29:02.133352161 +0000 UTC m=+67.638637816" Feb 12 20:29:02.158585 kubelet[1425]: I0212 20:29:02.158553 1425 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7c88768d9-tgrqb" podStartSLOduration=2.2485805 podCreationTimestamp="2024-02-12 20:28:54 +0000 UTC" firstStartedPulling="2024-02-12 20:28:55.732328738 +0000 UTC m=+61.237614393" lastFinishedPulling="2024-02-12 20:29:01.642281258 +0000 UTC m=+67.147566913" observedRunningTime="2024-02-12 20:29:02.158421458 +0000 UTC m=+67.663707113" watchObservedRunningTime="2024-02-12 20:29:02.15853302 +0000 UTC m=+67.663818665" Feb 12 20:29:02.167000 audit[3407]: NETFILTER_CFG table=filter:94 family=2 entries=10 op=nft_register_rule pid=3407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:29:02.167000 audit[3407]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc4af83f20 a2=0 a3=7ffc4af83f0c items=0 ppid=1627 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:02.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:29:02.168000 audit[3407]: NETFILTER_CFG table=nat:95 family=2 entries=44 op=nft_register_rule pid=3407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:29:02.168000 audit[3407]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc4af83f20 a2=0 a3=7ffc4af83f0c items=0 ppid=1627 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:29:02.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:29:02.862118 kubelet[1425]: E0212 20:29:02.862069 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:03.863085 kubelet[1425]: E0212 20:29:03.863027 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:04.863486 kubelet[1425]: E0212 20:29:04.863444 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:04.993487 kubelet[1425]: E0212 20:29:04.993460 1425 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 20:29:05.863894 kubelet[1425]: E0212 20:29:05.863845 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:06.864439 kubelet[1425]: E0212 20:29:06.864392 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:07.864788 kubelet[1425]: E0212 20:29:07.864748 1425 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:29:08.242053 systemd[1]: run-containerd-runc-k8s.io-8a0921ad9b12379a839cc917fc42fcfab007f7ba9f0189ef2217370e887d9271-runc.2AcKsn.mount: Deactivated successfully.