Feb 9 00:52:14.737801 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 00:52:14.737823 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 00:52:14.737835 kernel: BIOS-provided physical RAM map: Feb 9 00:52:14.737843 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 00:52:14.737850 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 00:52:14.737857 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 00:52:14.737866 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 00:52:14.737873 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 00:52:14.737880 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 00:52:14.737889 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 00:52:14.737895 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Feb 9 00:52:14.737900 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 00:52:14.737905 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 00:52:14.737913 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 00:52:14.737922 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 00:52:14.737932 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 00:52:14.737940 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 00:52:14.737948 kernel: NX (Execute Disable) protection: active Feb 9 00:52:14.737956 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 9 00:52:14.737964 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 9 00:52:14.737971 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 9 00:52:14.737979 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 9 00:52:14.737987 kernel: extended physical RAM map: Feb 9 00:52:14.737995 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 00:52:14.738002 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 00:52:14.738012 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 00:52:14.738020 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 00:52:14.738027 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 00:52:14.738035 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 00:52:14.738043 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 00:52:14.738051 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b1aa017] usable Feb 9 00:52:14.738059 kernel: reserve setup_data: [mem 0x000000009b1aa018-0x000000009b1e6e57] usable Feb 9 00:52:14.738067 kernel: reserve setup_data: [mem 0x000000009b1e6e58-0x000000009b3f7017] usable Feb 9 00:52:14.738088 kernel: reserve setup_data: [mem 0x000000009b3f7018-0x000000009b400c57] usable Feb 9 00:52:14.738096 kernel: reserve setup_data: [mem 0x000000009b400c58-0x000000009c8eefff] usable Feb 9 00:52:14.738103 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 00:52:14.738113 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 00:52:14.738121 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 00:52:14.738129 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 00:52:14.738138 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 00:52:14.738150 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 00:52:14.738158 kernel: efi: EFI v2.70 by EDK II Feb 9 00:52:14.738166 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Feb 9 00:52:14.738176 kernel: random: crng init done Feb 9 00:52:14.738184 kernel: SMBIOS 2.8 present. Feb 9 00:52:14.738202 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Feb 9 00:52:14.738211 kernel: Hypervisor detected: KVM Feb 9 00:52:14.738220 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 00:52:14.738228 kernel: kvm-clock: cpu 0, msr 29faa001, primary cpu clock Feb 9 00:52:14.738237 kernel: kvm-clock: using sched offset of 3952569222 cycles Feb 9 00:52:14.738246 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 00:52:14.738256 kernel: tsc: Detected 2794.750 MHz processor Feb 9 00:52:14.738267 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 00:52:14.738276 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 00:52:14.738285 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Feb 9 00:52:14.738294 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 00:52:14.738303 kernel: Using GB pages for direct mapping Feb 9 00:52:14.738312 kernel: Secure boot disabled Feb 9 00:52:14.738321 kernel: ACPI: Early table checksum verification disabled Feb 9 00:52:14.738329 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Feb 9 00:52:14.738338 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Feb 9 00:52:14.738349 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:52:14.738358 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:52:14.738366 kernel: ACPI: FACS 0x000000009CBDD000 000040 Feb 9 00:52:14.738374 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:52:14.738382 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:52:14.738391 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 00:52:14.738400 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Feb 9 00:52:14.738409 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Feb 9 00:52:14.738418 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Feb 9 00:52:14.738429 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Feb 9 00:52:14.738438 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Feb 9 00:52:14.738446 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Feb 9 00:52:14.738455 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Feb 9 00:52:14.738463 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Feb 9 00:52:14.738472 kernel: No NUMA configuration found Feb 9 00:52:14.738481 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Feb 9 00:52:14.738489 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Feb 9 00:52:14.738498 kernel: Zone ranges: Feb 9 00:52:14.738509 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 00:52:14.738517 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Feb 9 00:52:14.738526 kernel: Normal empty Feb 9 00:52:14.738534 kernel: Movable zone start for each node Feb 9 00:52:14.738543 kernel: Early memory node ranges Feb 9 00:52:14.738551 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 00:52:14.738560 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Feb 9 00:52:14.738569 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Feb 9 00:52:14.738578 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Feb 9 00:52:14.738588 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Feb 9 00:52:14.738597 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Feb 9 00:52:14.738605 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Feb 9 00:52:14.738614 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 00:52:14.738623 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 00:52:14.738631 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Feb 9 00:52:14.738640 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 00:52:14.738648 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Feb 9 00:52:14.738657 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Feb 9 00:52:14.738666 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Feb 9 00:52:14.738676 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 00:52:14.738685 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 00:52:14.738694 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 00:52:14.738702 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 00:52:14.738711 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 00:52:14.738720 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 00:52:14.738729 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 00:52:14.738737 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 00:52:14.738746 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 00:52:14.738757 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 00:52:14.738766 kernel: TSC deadline timer available Feb 9 00:52:14.738774 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 9 00:52:14.738783 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 9 00:52:14.738792 kernel: kvm-guest: setup PV sched yield Feb 9 00:52:14.738800 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Feb 9 00:52:14.738809 kernel: Booting paravirtualized kernel on KVM Feb 9 00:52:14.738818 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 00:52:14.738827 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 9 00:52:14.738837 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 9 00:52:14.738846 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 9 00:52:14.738861 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 9 00:52:14.738871 kernel: kvm-guest: setup async PF for cpu 0 Feb 9 00:52:14.738880 kernel: kvm-guest: stealtime: cpu 0, msr 9ae1c0c0 Feb 9 00:52:14.738889 kernel: kvm-guest: PV spinlocks enabled Feb 9 00:52:14.738899 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 00:52:14.738908 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Feb 9 00:52:14.738917 kernel: Policy zone: DMA32 Feb 9 00:52:14.738927 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 00:52:14.738937 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 00:52:14.738948 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 00:52:14.738957 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 00:52:14.738966 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 00:52:14.738976 kernel: Memory: 2400436K/2567000K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 166304K reserved, 0K cma-reserved) Feb 9 00:52:14.738986 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 00:52:14.739054 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 00:52:14.739064 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 00:52:14.739088 kernel: rcu: Hierarchical RCU implementation. Feb 9 00:52:14.739098 kernel: rcu: RCU event tracing is enabled. Feb 9 00:52:14.739107 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 00:52:14.739117 kernel: Rude variant of Tasks RCU enabled. Feb 9 00:52:14.739126 kernel: Tracing variant of Tasks RCU enabled. Feb 9 00:52:14.739135 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 00:52:14.739144 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 00:52:14.739157 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 9 00:52:14.739166 kernel: Console: colour dummy device 80x25 Feb 9 00:52:14.739175 kernel: printk: console [ttyS0] enabled Feb 9 00:52:14.739184 kernel: ACPI: Core revision 20210730 Feb 9 00:52:14.739199 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 00:52:14.739208 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 00:52:14.739217 kernel: x2apic enabled Feb 9 00:52:14.739226 kernel: Switched APIC routing to physical x2apic. Feb 9 00:52:14.739236 kernel: kvm-guest: setup PV IPIs Feb 9 00:52:14.739247 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 00:52:14.739256 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 00:52:14.739265 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 9 00:52:14.739274 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 9 00:52:14.739283 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 9 00:52:14.739292 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 9 00:52:14.739301 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 00:52:14.739310 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 00:52:14.739320 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 00:52:14.739330 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 00:52:14.739340 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 9 00:52:14.739349 kernel: RETBleed: Mitigation: untrained return thunk Feb 9 00:52:14.739358 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 00:52:14.739367 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 00:52:14.739376 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 00:52:14.739386 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 00:52:14.739395 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 00:52:14.739404 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 00:52:14.739415 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 00:52:14.739424 kernel: Freeing SMP alternatives memory: 32K Feb 9 00:52:14.739433 kernel: pid_max: default: 32768 minimum: 301 Feb 9 00:52:14.739442 kernel: LSM: Security Framework initializing Feb 9 00:52:14.739451 kernel: SELinux: Initializing. Feb 9 00:52:14.739460 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 00:52:14.739469 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 00:52:14.739479 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 9 00:52:14.739488 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 9 00:52:14.739498 kernel: ... version: 0 Feb 9 00:52:14.739507 kernel: ... bit width: 48 Feb 9 00:52:14.739516 kernel: ... generic registers: 6 Feb 9 00:52:14.739526 kernel: ... value mask: 0000ffffffffffff Feb 9 00:52:14.739535 kernel: ... max period: 00007fffffffffff Feb 9 00:52:14.739544 kernel: ... fixed-purpose events: 0 Feb 9 00:52:14.739553 kernel: ... event mask: 000000000000003f Feb 9 00:52:14.739562 kernel: signal: max sigframe size: 1776 Feb 9 00:52:14.739571 kernel: rcu: Hierarchical SRCU implementation. Feb 9 00:52:14.739580 kernel: smp: Bringing up secondary CPUs ... Feb 9 00:52:14.739589 kernel: x86: Booting SMP configuration: Feb 9 00:52:14.739598 kernel: .... node #0, CPUs: #1 Feb 9 00:52:14.739608 kernel: kvm-clock: cpu 1, msr 29faa041, secondary cpu clock Feb 9 00:52:14.739618 kernel: kvm-guest: setup async PF for cpu 1 Feb 9 00:52:14.739627 kernel: kvm-guest: stealtime: cpu 1, msr 9ae9c0c0 Feb 9 00:52:14.739636 kernel: #2 Feb 9 00:52:14.739645 kernel: kvm-clock: cpu 2, msr 29faa081, secondary cpu clock Feb 9 00:52:14.739654 kernel: kvm-guest: setup async PF for cpu 2 Feb 9 00:52:14.739665 kernel: kvm-guest: stealtime: cpu 2, msr 9af1c0c0 Feb 9 00:52:14.739674 kernel: #3 Feb 9 00:52:14.739683 kernel: kvm-clock: cpu 3, msr 29faa0c1, secondary cpu clock Feb 9 00:52:14.739692 kernel: kvm-guest: setup async PF for cpu 3 Feb 9 00:52:14.739701 kernel: kvm-guest: stealtime: cpu 3, msr 9af9c0c0 Feb 9 00:52:14.739711 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 00:52:14.739720 kernel: smpboot: Max logical packages: 1 Feb 9 00:52:14.739729 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 9 00:52:14.739739 kernel: devtmpfs: initialized Feb 9 00:52:14.739748 kernel: x86/mm: Memory block size: 128MB Feb 9 00:52:14.739759 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Feb 9 00:52:14.739769 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Feb 9 00:52:14.739778 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Feb 9 00:52:14.739787 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Feb 9 00:52:14.739797 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Feb 9 00:52:14.739807 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 00:52:14.739816 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 00:52:14.739825 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 00:52:14.739835 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 00:52:14.739845 kernel: audit: initializing netlink subsys (disabled) Feb 9 00:52:14.739855 kernel: audit: type=2000 audit(1707439933.941:1): state=initialized audit_enabled=0 res=1 Feb 9 00:52:14.739864 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 00:52:14.739873 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 00:52:14.739883 kernel: cpuidle: using governor menu Feb 9 00:52:14.739892 kernel: ACPI: bus type PCI registered Feb 9 00:52:14.739901 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 00:52:14.739910 kernel: dca service started, version 1.12.1 Feb 9 00:52:14.739920 kernel: PCI: Using configuration type 1 for base access Feb 9 00:52:14.739931 kernel: PCI: Using configuration type 1 for extended access Feb 9 00:52:14.739941 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 00:52:14.739950 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 00:52:14.739960 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 00:52:14.739969 kernel: ACPI: Added _OSI(Module Device) Feb 9 00:52:14.739978 kernel: ACPI: Added _OSI(Processor Device) Feb 9 00:52:14.739987 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 00:52:14.739996 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 00:52:14.740006 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 00:52:14.740017 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 00:52:14.740026 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 00:52:14.740036 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 00:52:14.740045 kernel: ACPI: Interpreter enabled Feb 9 00:52:14.740054 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 00:52:14.740064 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 00:52:14.740086 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 00:52:14.740095 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 00:52:14.740105 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 00:52:14.740253 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 00:52:14.740266 kernel: acpiphp: Slot [3] registered Feb 9 00:52:14.740273 kernel: acpiphp: Slot [4] registered Feb 9 00:52:14.740280 kernel: acpiphp: Slot [5] registered Feb 9 00:52:14.740287 kernel: acpiphp: Slot [6] registered Feb 9 00:52:14.740294 kernel: acpiphp: Slot [7] registered Feb 9 00:52:14.740300 kernel: acpiphp: Slot [8] registered Feb 9 00:52:14.740307 kernel: acpiphp: Slot [9] registered Feb 9 00:52:14.740316 kernel: acpiphp: Slot [10] registered Feb 9 00:52:14.740322 kernel: acpiphp: Slot [11] registered Feb 9 00:52:14.740329 kernel: acpiphp: Slot [12] registered Feb 9 00:52:14.740336 kernel: acpiphp: Slot [13] registered Feb 9 00:52:14.740342 kernel: acpiphp: Slot [14] registered Feb 9 00:52:14.740349 kernel: acpiphp: Slot [15] registered Feb 9 00:52:14.740355 kernel: acpiphp: Slot [16] registered Feb 9 00:52:14.740362 kernel: acpiphp: Slot [17] registered Feb 9 00:52:14.740369 kernel: acpiphp: Slot [18] registered Feb 9 00:52:14.740376 kernel: acpiphp: Slot [19] registered Feb 9 00:52:14.740383 kernel: acpiphp: Slot [20] registered Feb 9 00:52:14.740389 kernel: acpiphp: Slot [21] registered Feb 9 00:52:14.740396 kernel: acpiphp: Slot [22] registered Feb 9 00:52:14.740403 kernel: acpiphp: Slot [23] registered Feb 9 00:52:14.740409 kernel: acpiphp: Slot [24] registered Feb 9 00:52:14.740416 kernel: acpiphp: Slot [25] registered Feb 9 00:52:14.740422 kernel: acpiphp: Slot [26] registered Feb 9 00:52:14.740429 kernel: acpiphp: Slot [27] registered Feb 9 00:52:14.740436 kernel: acpiphp: Slot [28] registered Feb 9 00:52:14.740443 kernel: acpiphp: Slot [29] registered Feb 9 00:52:14.740450 kernel: acpiphp: Slot [30] registered Feb 9 00:52:14.740457 kernel: acpiphp: Slot [31] registered Feb 9 00:52:14.740463 kernel: PCI host bridge to bus 0000:00 Feb 9 00:52:14.740543 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 00:52:14.740606 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 00:52:14.740677 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 00:52:14.740743 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 9 00:52:14.740807 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Feb 9 00:52:14.740867 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 00:52:14.740961 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 00:52:14.741039 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 00:52:14.741152 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 00:52:14.741234 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 9 00:52:14.741309 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 00:52:14.741392 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 00:52:14.741463 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 00:52:14.741531 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 00:52:14.741621 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 00:52:14.741692 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 00:52:14.741773 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 9 00:52:14.741862 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 9 00:52:14.741930 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Feb 9 00:52:14.742015 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Feb 9 00:52:14.742180 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Feb 9 00:52:14.742281 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Feb 9 00:52:14.742371 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 00:52:14.742474 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 00:52:14.742560 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 9 00:52:14.742653 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Feb 9 00:52:14.742744 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Feb 9 00:52:14.742847 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 00:52:14.742938 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 00:52:14.743030 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Feb 9 00:52:14.743158 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Feb 9 00:52:14.743267 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 9 00:52:14.743361 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 00:52:14.743448 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Feb 9 00:52:14.743563 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Feb 9 00:52:14.743637 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Feb 9 00:52:14.743647 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 00:52:14.743667 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 00:52:14.743678 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 00:52:14.743685 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 00:52:14.743692 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 00:52:14.743699 kernel: iommu: Default domain type: Translated Feb 9 00:52:14.743705 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 00:52:14.743815 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 00:52:14.743943 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 00:52:14.744064 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 00:52:14.744113 kernel: vgaarb: loaded Feb 9 00:52:14.744120 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 00:52:14.744127 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 00:52:14.744134 kernel: PTP clock support registered Feb 9 00:52:14.744141 kernel: Registered efivars operations Feb 9 00:52:14.744149 kernel: PCI: Using ACPI for IRQ routing Feb 9 00:52:14.744157 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 00:52:14.744165 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Feb 9 00:52:14.744174 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Feb 9 00:52:14.744182 kernel: e820: reserve RAM buffer [mem 0x9b1aa018-0x9bffffff] Feb 9 00:52:14.744189 kernel: e820: reserve RAM buffer [mem 0x9b3f7018-0x9bffffff] Feb 9 00:52:14.744202 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Feb 9 00:52:14.744209 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Feb 9 00:52:14.744216 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 00:52:14.744223 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 00:52:14.744230 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 00:52:14.744237 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 00:52:14.744244 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 00:52:14.744252 kernel: pnp: PnP ACPI init Feb 9 00:52:14.744327 kernel: pnp 00:02: [dma 2] Feb 9 00:52:14.744337 kernel: pnp: PnP ACPI: found 6 devices Feb 9 00:52:14.744344 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 00:52:14.744353 kernel: NET: Registered PF_INET protocol family Feb 9 00:52:14.744362 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 00:52:14.744371 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 00:52:14.744381 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 00:52:14.744391 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 00:52:14.744398 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 00:52:14.744405 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 00:52:14.744412 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 00:52:14.744419 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 00:52:14.744426 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 00:52:14.744433 kernel: NET: Registered PF_XDP protocol family Feb 9 00:52:14.744521 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Feb 9 00:52:14.744624 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Feb 9 00:52:14.744702 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 00:52:14.744781 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 00:52:14.744845 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 00:52:14.744933 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 9 00:52:14.744999 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Feb 9 00:52:14.745121 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 00:52:14.745224 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 00:52:14.745330 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 00:52:14.745344 kernel: PCI: CLS 0 bytes, default 64 Feb 9 00:52:14.745354 kernel: Initialise system trusted keyrings Feb 9 00:52:14.745364 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 00:52:14.745373 kernel: Key type asymmetric registered Feb 9 00:52:14.745382 kernel: Asymmetric key parser 'x509' registered Feb 9 00:52:14.745392 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 00:52:14.745401 kernel: io scheduler mq-deadline registered Feb 9 00:52:14.745411 kernel: io scheduler kyber registered Feb 9 00:52:14.745423 kernel: io scheduler bfq registered Feb 9 00:52:14.745434 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 00:52:14.745445 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 00:52:14.745455 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 00:52:14.745465 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 00:52:14.745475 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 00:52:14.745484 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 00:52:14.745494 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 00:52:14.745504 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 00:52:14.745515 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 00:52:14.745525 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 00:52:14.745630 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 9 00:52:14.745716 kernel: rtc_cmos 00:05: registered as rtc0 Feb 9 00:52:14.745807 kernel: rtc_cmos 00:05: setting system clock to 2024-02-09T00:52:14 UTC (1707439934) Feb 9 00:52:14.745892 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 9 00:52:14.745905 kernel: efifb: probing for efifb Feb 9 00:52:14.745916 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Feb 9 00:52:14.745926 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Feb 9 00:52:14.745935 kernel: efifb: scrolling: redraw Feb 9 00:52:14.745945 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 00:52:14.745955 kernel: Console: switching to colour frame buffer device 160x50 Feb 9 00:52:14.745964 kernel: fb0: EFI VGA frame buffer device Feb 9 00:52:14.745974 kernel: pstore: Registered efi as persistent store backend Feb 9 00:52:14.745986 kernel: NET: Registered PF_INET6 protocol family Feb 9 00:52:14.745995 kernel: Segment Routing with IPv6 Feb 9 00:52:14.746005 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 00:52:14.746014 kernel: NET: Registered PF_PACKET protocol family Feb 9 00:52:14.746024 kernel: Key type dns_resolver registered Feb 9 00:52:14.746033 kernel: IPI shorthand broadcast: enabled Feb 9 00:52:14.746043 kernel: sched_clock: Marking stable (427137082, 150840376)->(643044188, -65066730) Feb 9 00:52:14.746052 kernel: registered taskstats version 1 Feb 9 00:52:14.746062 kernel: Loading compiled-in X.509 certificates Feb 9 00:52:14.746129 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 00:52:14.746139 kernel: Key type .fscrypt registered Feb 9 00:52:14.746149 kernel: Key type fscrypt-provisioning registered Feb 9 00:52:14.746159 kernel: pstore: Using crash dump compression: deflate Feb 9 00:52:14.746169 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 00:52:14.746179 kernel: ima: Allocated hash algorithm: sha1 Feb 9 00:52:14.746189 kernel: ima: No architecture policies found Feb 9 00:52:14.746207 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 00:52:14.746219 kernel: Write protecting the kernel read-only data: 28672k Feb 9 00:52:14.746235 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 00:52:14.746264 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 00:52:14.746275 kernel: Run /init as init process Feb 9 00:52:14.746285 kernel: with arguments: Feb 9 00:52:14.746294 kernel: /init Feb 9 00:52:14.746304 kernel: with environment: Feb 9 00:52:14.746313 kernel: HOME=/ Feb 9 00:52:14.746322 kernel: TERM=linux Feb 9 00:52:14.746332 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 00:52:14.746347 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 00:52:14.746368 systemd[1]: Detected virtualization kvm. Feb 9 00:52:14.746379 systemd[1]: Detected architecture x86-64. Feb 9 00:52:14.746389 systemd[1]: Running in initrd. Feb 9 00:52:14.746399 systemd[1]: No hostname configured, using default hostname. Feb 9 00:52:14.746409 systemd[1]: Hostname set to . Feb 9 00:52:14.746420 systemd[1]: Initializing machine ID from VM UUID. Feb 9 00:52:14.746434 systemd[1]: Queued start job for default target initrd.target. Feb 9 00:52:14.746444 systemd[1]: Started systemd-ask-password-console.path. Feb 9 00:52:14.746454 systemd[1]: Reached target cryptsetup.target. Feb 9 00:52:14.746464 systemd[1]: Reached target paths.target. Feb 9 00:52:14.746475 systemd[1]: Reached target slices.target. Feb 9 00:52:14.746484 systemd[1]: Reached target swap.target. Feb 9 00:52:14.746495 systemd[1]: Reached target timers.target. Feb 9 00:52:14.746506 systemd[1]: Listening on iscsid.socket. Feb 9 00:52:14.746517 systemd[1]: Listening on iscsiuio.socket. Feb 9 00:52:14.746529 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 00:52:14.746540 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 00:52:14.746550 systemd[1]: Listening on systemd-journald.socket. Feb 9 00:52:14.746560 systemd[1]: Listening on systemd-networkd.socket. Feb 9 00:52:14.746571 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 00:52:14.746581 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 00:52:14.746591 systemd[1]: Reached target sockets.target. Feb 9 00:52:14.746603 systemd[1]: Starting kmod-static-nodes.service... Feb 9 00:52:14.746614 systemd[1]: Finished network-cleanup.service. Feb 9 00:52:14.746624 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 00:52:14.746635 systemd[1]: Starting systemd-journald.service... Feb 9 00:52:14.746645 systemd[1]: Starting systemd-modules-load.service... Feb 9 00:52:14.746656 systemd[1]: Starting systemd-resolved.service... Feb 9 00:52:14.746666 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 00:52:14.746676 systemd[1]: Finished kmod-static-nodes.service. Feb 9 00:52:14.746687 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 00:52:14.746698 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 00:52:14.746708 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 00:52:14.746716 kernel: audit: type=1130 audit(1707439934.744:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.746726 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 00:52:14.746740 systemd-journald[198]: Journal started Feb 9 00:52:14.746800 systemd-journald[198]: Runtime Journal (/run/log/journal/0e1eaa3281754878a4981c468d51fad7) is 6.0M, max 48.4M, 42.4M free. Feb 9 00:52:14.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.750095 kernel: audit: type=1130 audit(1707439934.747:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.750147 systemd[1]: Started systemd-journald.service. Feb 9 00:52:14.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.752390 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 00:52:14.754255 kernel: audit: type=1130 audit(1707439934.751:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.753159 systemd-modules-load[199]: Inserted module 'overlay' Feb 9 00:52:14.762955 systemd-resolved[200]: Positive Trust Anchors: Feb 9 00:52:14.762968 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 00:52:14.762996 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 00:52:14.765146 systemd-resolved[200]: Defaulting to hostname 'linux'. Feb 9 00:52:14.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.765830 systemd[1]: Started systemd-resolved.service. Feb 9 00:52:14.768385 kernel: audit: type=1130 audit(1707439934.765:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.766088 systemd[1]: Reached target nss-lookup.target. Feb 9 00:52:14.771833 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 00:52:14.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.774183 systemd[1]: Starting dracut-cmdline.service... Feb 9 00:52:14.777475 kernel: audit: type=1130 audit(1707439934.773:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.782608 dracut-cmdline[218]: dracut-dracut-053 Feb 9 00:52:14.784457 dracut-cmdline[218]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 00:52:14.798100 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 00:52:14.800356 systemd-modules-load[199]: Inserted module 'br_netfilter' Feb 9 00:52:14.801181 kernel: Bridge firewalling registered Feb 9 00:52:14.826341 kernel: SCSI subsystem initialized Feb 9 00:52:14.839041 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 00:52:14.839130 kernel: device-mapper: uevent: version 1.0.3 Feb 9 00:52:14.839141 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 00:52:14.842322 systemd-modules-load[199]: Inserted module 'dm_multipath' Feb 9 00:52:14.843759 systemd[1]: Finished systemd-modules-load.service. Feb 9 00:52:14.848513 kernel: audit: type=1130 audit(1707439934.844:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.848541 kernel: Loading iSCSI transport class v2.0-870. Feb 9 00:52:14.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.847376 systemd[1]: Starting systemd-sysctl.service... Feb 9 00:52:14.855493 systemd[1]: Finished systemd-sysctl.service. Feb 9 00:52:14.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.860098 kernel: audit: type=1130 audit(1707439934.856:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.863096 kernel: iscsi: registered transport (tcp) Feb 9 00:52:14.888133 kernel: iscsi: registered transport (qla4xxx) Feb 9 00:52:14.888179 kernel: QLogic iSCSI HBA Driver Feb 9 00:52:14.913953 systemd[1]: Finished dracut-cmdline.service. Feb 9 00:52:14.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.916477 systemd[1]: Starting dracut-pre-udev.service... Feb 9 00:52:14.919429 kernel: audit: type=1130 audit(1707439934.915:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:14.966130 kernel: raid6: avx2x4 gen() 24606 MB/s Feb 9 00:52:14.983103 kernel: raid6: avx2x4 xor() 6285 MB/s Feb 9 00:52:15.000096 kernel: raid6: avx2x2 gen() 24706 MB/s Feb 9 00:52:15.017103 kernel: raid6: avx2x2 xor() 15770 MB/s Feb 9 00:52:15.034109 kernel: raid6: avx2x1 gen() 21287 MB/s Feb 9 00:52:15.051132 kernel: raid6: avx2x1 xor() 13132 MB/s Feb 9 00:52:15.068117 kernel: raid6: sse2x4 gen() 10060 MB/s Feb 9 00:52:15.085114 kernel: raid6: sse2x4 xor() 5447 MB/s Feb 9 00:52:15.102136 kernel: raid6: sse2x2 gen() 16138 MB/s Feb 9 00:52:15.119141 kernel: raid6: sse2x2 xor() 9856 MB/s Feb 9 00:52:15.136114 kernel: raid6: sse2x1 gen() 12418 MB/s Feb 9 00:52:15.153305 kernel: raid6: sse2x1 xor() 6320 MB/s Feb 9 00:52:15.153360 kernel: raid6: using algorithm avx2x2 gen() 24706 MB/s Feb 9 00:52:15.153370 kernel: raid6: .... xor() 15770 MB/s, rmw enabled Feb 9 00:52:15.154466 kernel: raid6: using avx2x2 recovery algorithm Feb 9 00:52:15.166112 kernel: xor: automatically using best checksumming function avx Feb 9 00:52:15.253109 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 00:52:15.261189 systemd[1]: Finished dracut-pre-udev.service. Feb 9 00:52:15.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:15.264000 audit: BPF prog-id=7 op=LOAD Feb 9 00:52:15.264000 audit: BPF prog-id=8 op=LOAD Feb 9 00:52:15.264707 systemd[1]: Starting systemd-udevd.service... Feb 9 00:52:15.265707 kernel: audit: type=1130 audit(1707439935.262:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:15.275619 systemd-udevd[401]: Using default interface naming scheme 'v252'. Feb 9 00:52:15.279361 systemd[1]: Started systemd-udevd.service. Feb 9 00:52:15.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:15.282390 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 00:52:15.291966 dracut-pre-trigger[411]: rd.md=0: removing MD RAID activation Feb 9 00:52:15.317828 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 00:52:15.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:15.319325 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 00:52:15.351273 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 00:52:15.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:15.383116 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 00:52:15.386108 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 00:52:15.388248 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 00:52:15.388275 kernel: GPT:9289727 != 19775487 Feb 9 00:52:15.388290 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 00:52:15.389480 kernel: GPT:9289727 != 19775487 Feb 9 00:52:15.389501 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 00:52:15.391092 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 00:52:15.398420 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 00:52:15.398475 kernel: AES CTR mode by8 optimization enabled Feb 9 00:52:15.409087 kernel: libata version 3.00 loaded. Feb 9 00:52:15.412089 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 00:52:15.415100 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (453) Feb 9 00:52:15.418094 kernel: scsi host0: ata_piix Feb 9 00:52:15.420914 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 00:52:15.422616 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 00:52:15.425576 kernel: scsi host1: ata_piix Feb 9 00:52:15.425702 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 9 00:52:15.425713 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 9 00:52:15.428552 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 00:52:15.435340 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 00:52:15.439386 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 00:52:15.441271 systemd[1]: Starting disk-uuid.service... Feb 9 00:52:15.446647 disk-uuid[516]: Primary Header is updated. Feb 9 00:52:15.446647 disk-uuid[516]: Secondary Entries is updated. Feb 9 00:52:15.446647 disk-uuid[516]: Secondary Header is updated. Feb 9 00:52:15.449035 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 00:52:15.451084 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 00:52:15.584092 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 9 00:52:15.584149 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 9 00:52:15.615164 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 9 00:52:15.615358 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 00:52:15.633273 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 9 00:52:16.452052 disk-uuid[517]: The operation has completed successfully. Feb 9 00:52:16.453268 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 00:52:16.476160 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 00:52:16.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.476241 systemd[1]: Finished disk-uuid.service. Feb 9 00:52:16.480291 systemd[1]: Starting verity-setup.service... Feb 9 00:52:16.492090 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 9 00:52:16.510475 systemd[1]: Found device dev-mapper-usr.device. Feb 9 00:52:16.511325 systemd[1]: Mounting sysusr-usr.mount... Feb 9 00:52:16.512971 systemd[1]: Finished verity-setup.service. Feb 9 00:52:16.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.568098 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 00:52:16.568402 systemd[1]: Mounted sysusr-usr.mount. Feb 9 00:52:16.568846 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 00:52:16.569490 systemd[1]: Starting ignition-setup.service... Feb 9 00:52:16.570423 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 00:52:16.577480 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 00:52:16.577511 kernel: BTRFS info (device vda6): using free space tree Feb 9 00:52:16.577521 kernel: BTRFS info (device vda6): has skinny extents Feb 9 00:52:16.584953 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 00:52:16.593198 systemd[1]: Finished ignition-setup.service. Feb 9 00:52:16.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.595013 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 00:52:16.626767 ignition[629]: Ignition 2.14.0 Feb 9 00:52:16.627543 ignition[629]: Stage: fetch-offline Feb 9 00:52:16.628061 ignition[629]: no configs at "/usr/lib/ignition/base.d" Feb 9 00:52:16.628403 ignition[629]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:52:16.628619 ignition[629]: parsed url from cmdline: "" Feb 9 00:52:16.628623 ignition[629]: no config URL provided Feb 9 00:52:16.628628 ignition[629]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 00:52:16.628636 ignition[629]: no config at "/usr/lib/ignition/user.ign" Feb 9 00:52:16.628652 ignition[629]: op(1): [started] loading QEMU firmware config module Feb 9 00:52:16.628656 ignition[629]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 00:52:16.635351 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 00:52:16.636375 ignition[629]: op(1): [finished] loading QEMU firmware config module Feb 9 00:52:16.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.637000 audit: BPF prog-id=9 op=LOAD Feb 9 00:52:16.638002 systemd[1]: Starting systemd-networkd.service... Feb 9 00:52:16.647440 ignition[629]: parsing config with SHA512: 9ddc3c5469f48667b1afbddd3f712b6b2ff31aa22486a440f50a566b0690c2ef3b73b0c2f8e966d49463a0c6dea632a3195bc8f1ede0c19d9488f474a0555ade Feb 9 00:52:16.663596 unknown[629]: fetched base config from "system" Feb 9 00:52:16.663967 unknown[629]: fetched user config from "qemu" Feb 9 00:52:16.665102 ignition[629]: fetch-offline: fetch-offline passed Feb 9 00:52:16.665488 ignition[629]: Ignition finished successfully Feb 9 00:52:16.666940 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 00:52:16.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.666975 systemd-networkd[709]: lo: Link UP Feb 9 00:52:16.666979 systemd-networkd[709]: lo: Gained carrier Feb 9 00:52:16.669366 systemd-networkd[709]: Enumeration completed Feb 9 00:52:16.669424 systemd[1]: Started systemd-networkd.service. Feb 9 00:52:16.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.670425 systemd[1]: Reached target network.target. Feb 9 00:52:16.670777 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 00:52:16.671453 systemd[1]: Starting ignition-kargs.service... Feb 9 00:52:16.672563 systemd[1]: Starting iscsiuio.service... Feb 9 00:52:16.674833 systemd-networkd[709]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 00:52:16.676329 systemd-networkd[709]: eth0: Link UP Feb 9 00:52:16.676337 systemd-networkd[709]: eth0: Gained carrier Feb 9 00:52:16.677352 systemd[1]: Started iscsiuio.service. Feb 9 00:52:16.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.678494 systemd[1]: Starting iscsid.service... Feb 9 00:52:16.683089 iscsid[716]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 00:52:16.683089 iscsid[716]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 00:52:16.683089 iscsid[716]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 00:52:16.683089 iscsid[716]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 00:52:16.683089 iscsid[716]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 00:52:16.683089 iscsid[716]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 00:52:16.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.682539 systemd[1]: Started iscsid.service. Feb 9 00:52:16.684826 ignition[712]: Ignition 2.14.0 Feb 9 00:52:16.683857 systemd[1]: Starting dracut-initqueue.service... Feb 9 00:52:16.684831 ignition[712]: Stage: kargs Feb 9 00:52:16.693243 systemd[1]: Finished ignition-kargs.service. Feb 9 00:52:16.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.684907 ignition[712]: no configs at "/usr/lib/ignition/base.d" Feb 9 00:52:16.694294 systemd-networkd[709]: eth0: DHCPv4 address 10.0.0.120/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 00:52:16.684915 ignition[712]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:52:16.696289 systemd[1]: Finished dracut-initqueue.service. Feb 9 00:52:16.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.685914 ignition[712]: kargs: kargs passed Feb 9 00:52:16.685945 ignition[712]: Ignition finished successfully Feb 9 00:52:16.699010 systemd[1]: Reached target remote-fs-pre.target. Feb 9 00:52:16.700230 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 00:52:16.701420 systemd[1]: Reached target remote-fs.target. Feb 9 00:52:16.703377 systemd[1]: Starting dracut-pre-mount.service... Feb 9 00:52:16.704933 systemd[1]: Starting ignition-disks.service... Feb 9 00:52:16.710210 systemd[1]: Finished dracut-pre-mount.service. Feb 9 00:52:16.711028 ignition[731]: Ignition 2.14.0 Feb 9 00:52:16.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.711033 ignition[731]: Stage: disks Feb 9 00:52:16.711129 ignition[731]: no configs at "/usr/lib/ignition/base.d" Feb 9 00:52:16.711137 ignition[731]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:52:16.711865 ignition[731]: disks: disks passed Feb 9 00:52:16.711895 ignition[731]: Ignition finished successfully Feb 9 00:52:16.715143 systemd[1]: Finished ignition-disks.service. Feb 9 00:52:16.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.715814 systemd[1]: Reached target initrd-root-device.target. Feb 9 00:52:16.716851 systemd[1]: Reached target local-fs-pre.target. Feb 9 00:52:16.717434 systemd[1]: Reached target local-fs.target. Feb 9 00:52:16.717976 systemd[1]: Reached target sysinit.target. Feb 9 00:52:16.719057 systemd[1]: Reached target basic.target. Feb 9 00:52:16.720016 systemd[1]: Starting systemd-fsck-root.service... Feb 9 00:52:16.729605 systemd-fsck[743]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 00:52:16.734568 systemd[1]: Finished systemd-fsck-root.service. Feb 9 00:52:16.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.735907 systemd[1]: Mounting sysroot.mount... Feb 9 00:52:16.741969 systemd[1]: Mounted sysroot.mount. Feb 9 00:52:16.742919 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 00:52:16.742935 systemd[1]: Reached target initrd-root-fs.target. Feb 9 00:52:16.744815 systemd[1]: Mounting sysroot-usr.mount... Feb 9 00:52:16.746012 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 00:52:16.746045 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 00:52:16.746951 systemd[1]: Reached target ignition-diskful.target. Feb 9 00:52:16.749828 systemd[1]: Mounted sysroot-usr.mount. Feb 9 00:52:16.751361 systemd[1]: Starting initrd-setup-root.service... Feb 9 00:52:16.755174 initrd-setup-root[753]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 00:52:16.758793 initrd-setup-root[761]: cut: /sysroot/etc/group: No such file or directory Feb 9 00:52:16.761538 initrd-setup-root[769]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 00:52:16.764548 initrd-setup-root[777]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 00:52:16.787216 systemd[1]: Finished initrd-setup-root.service. Feb 9 00:52:16.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.788224 systemd[1]: Starting ignition-mount.service... Feb 9 00:52:16.789270 systemd[1]: Starting sysroot-boot.service... Feb 9 00:52:16.792545 bash[794]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 00:52:16.799980 ignition[795]: INFO : Ignition 2.14.0 Feb 9 00:52:16.799980 ignition[795]: INFO : Stage: mount Feb 9 00:52:16.801257 ignition[795]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 00:52:16.801257 ignition[795]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:52:16.801257 ignition[795]: INFO : mount: mount passed Feb 9 00:52:16.801257 ignition[795]: INFO : Ignition finished successfully Feb 9 00:52:16.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.803099 systemd[1]: Finished ignition-mount.service. Feb 9 00:52:16.806543 systemd[1]: Finished sysroot-boot.service. Feb 9 00:52:16.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:16.912189 systemd-resolved[200]: Detected conflict on linux IN A 10.0.0.120 Feb 9 00:52:16.912202 systemd-resolved[200]: Hostname conflict, changing published hostname from 'linux' to 'linux5'. Feb 9 00:52:17.519206 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 00:52:17.524096 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (805) Feb 9 00:52:17.526155 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 00:52:17.526173 kernel: BTRFS info (device vda6): using free space tree Feb 9 00:52:17.526183 kernel: BTRFS info (device vda6): has skinny extents Feb 9 00:52:17.529008 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 00:52:17.530893 systemd[1]: Starting ignition-files.service... Feb 9 00:52:17.543550 ignition[825]: INFO : Ignition 2.14.0 Feb 9 00:52:17.543550 ignition[825]: INFO : Stage: files Feb 9 00:52:17.544737 ignition[825]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 00:52:17.544737 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:52:17.544737 ignition[825]: DEBUG : files: compiled without relabeling support, skipping Feb 9 00:52:17.547409 ignition[825]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 00:52:17.547409 ignition[825]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 00:52:17.549327 ignition[825]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 00:52:17.550326 ignition[825]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 00:52:17.551652 unknown[825]: wrote ssh authorized keys file for user: core Feb 9 00:52:17.552410 ignition[825]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 00:52:17.553572 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 00:52:17.555298 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 00:52:17.734290 systemd-networkd[709]: eth0: Gained IPv6LL Feb 9 00:52:17.946961 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 00:52:18.167085 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 00:52:18.169012 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 00:52:18.169012 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 00:52:18.169012 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 00:52:18.463108 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 00:52:18.546702 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 00:52:18.548695 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 00:52:18.549937 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 00:52:18.551020 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 9 00:52:18.617252 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 00:52:18.773323 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 9 00:52:18.773323 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 00:52:18.776473 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 00:52:18.776473 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 9 00:52:18.819427 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 00:52:19.219454 ignition[825]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 9 00:52:19.219454 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 00:52:19.235625 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 00:52:19.235625 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 00:52:19.235625 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 00:52:19.239221 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 00:52:19.269488 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 00:52:19.270803 ignition[825]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 00:52:19.270803 ignition[825]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Feb 9 00:52:19.272875 ignition[825]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 00:52:19.274281 ignition[825]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 00:52:19.274281 ignition[825]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Feb 9 00:52:19.274281 ignition[825]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Feb 9 00:52:19.274281 ignition[825]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 00:52:19.278803 ignition[825]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 00:52:19.278803 ignition[825]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Feb 9 00:52:19.278803 ignition[825]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Feb 9 00:52:19.278803 ignition[825]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 00:52:19.278803 ignition[825]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 00:52:19.278803 ignition[825]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Feb 9 00:52:19.285437 ignition[825]: INFO : files: op(10): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 00:52:19.285437 ignition[825]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 00:52:19.285437 ignition[825]: INFO : files: op(11): [started] setting preset to enabled for "prepare-critools.service" Feb 9 00:52:19.285437 ignition[825]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 00:52:19.285437 ignition[825]: INFO : files: op(12): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 00:52:19.285437 ignition[825]: INFO : files: op(12): op(13): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 00:52:19.305022 ignition[825]: INFO : files: op(12): op(13): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 00:52:19.306225 ignition[825]: INFO : files: op(12): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 00:52:19.307206 ignition[825]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 00:52:19.308421 ignition[825]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 00:52:19.308421 ignition[825]: INFO : files: files passed Feb 9 00:52:19.310158 ignition[825]: INFO : Ignition finished successfully Feb 9 00:52:19.311721 systemd[1]: Finished ignition-files.service. Feb 9 00:52:19.315438 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 00:52:19.315462 kernel: audit: type=1130 audit(1707439939.311:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.315410 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 00:52:19.315727 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 00:52:19.316291 systemd[1]: Starting ignition-quench.service... Feb 9 00:52:19.318406 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 00:52:19.323732 kernel: audit: type=1130 audit(1707439939.318:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.323747 kernel: audit: type=1131 audit(1707439939.318:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.318487 systemd[1]: Finished ignition-quench.service. Feb 9 00:52:19.327840 initrd-setup-root-after-ignition[851]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 00:52:19.330056 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 00:52:19.331620 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 00:52:19.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.332987 systemd[1]: Reached target ignition-complete.target. Feb 9 00:52:19.336179 kernel: audit: type=1130 audit(1707439939.332:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.336771 systemd[1]: Starting initrd-parse-etc.service... Feb 9 00:52:19.349049 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 00:52:19.349743 systemd[1]: Finished initrd-parse-etc.service. Feb 9 00:52:19.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.350885 systemd[1]: Reached target initrd-fs.target. Feb 9 00:52:19.355720 kernel: audit: type=1130 audit(1707439939.350:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.355734 kernel: audit: type=1131 audit(1707439939.350:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.355706 systemd[1]: Reached target initrd.target. Feb 9 00:52:19.356722 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 00:52:19.358187 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 00:52:19.367990 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 00:52:19.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.369663 systemd[1]: Starting initrd-cleanup.service... Feb 9 00:52:19.372023 kernel: audit: type=1130 audit(1707439939.368:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.377904 systemd[1]: Stopped target nss-lookup.target. Feb 9 00:52:19.379038 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 00:52:19.380284 systemd[1]: Stopped target timers.target. Feb 9 00:52:19.381323 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 00:52:19.382012 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 00:52:19.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.383220 systemd[1]: Stopped target initrd.target. Feb 9 00:52:19.386106 kernel: audit: type=1131 audit(1707439939.383:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.386164 systemd[1]: Stopped target basic.target. Feb 9 00:52:19.387190 systemd[1]: Stopped target ignition-complete.target. Feb 9 00:52:19.388407 systemd[1]: Stopped target ignition-diskful.target. Feb 9 00:52:19.389590 systemd[1]: Stopped target initrd-root-device.target. Feb 9 00:52:19.390800 systemd[1]: Stopped target remote-fs.target. Feb 9 00:52:19.391872 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 00:52:19.393017 systemd[1]: Stopped target sysinit.target. Feb 9 00:52:19.394059 systemd[1]: Stopped target local-fs.target. Feb 9 00:52:19.395124 systemd[1]: Stopped target local-fs-pre.target. Feb 9 00:52:19.396248 systemd[1]: Stopped target swap.target. Feb 9 00:52:19.397222 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 00:52:19.397895 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 00:52:19.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.399047 systemd[1]: Stopped target cryptsetup.target. Feb 9 00:52:19.401985 kernel: audit: type=1131 audit(1707439939.398:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.402008 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 00:52:19.402703 systemd[1]: Stopped dracut-initqueue.service. Feb 9 00:52:19.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.403844 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 00:52:19.417250 kernel: audit: type=1131 audit(1707439939.403:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.403926 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 00:52:19.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.418452 systemd[1]: Stopped target paths.target. Feb 9 00:52:19.419462 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 00:52:19.424120 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 00:52:19.425378 systemd[1]: Stopped target slices.target. Feb 9 00:52:19.426409 systemd[1]: Stopped target sockets.target. Feb 9 00:52:19.427464 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 00:52:19.428292 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 00:52:19.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.429660 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 00:52:19.430342 systemd[1]: Stopped ignition-files.service. Feb 9 00:52:19.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.432198 systemd[1]: Stopping ignition-mount.service... Feb 9 00:52:19.433354 systemd[1]: Stopping iscsid.service... Feb 9 00:52:19.434226 iscsid[716]: iscsid shutting down. Feb 9 00:52:19.435326 systemd[1]: Stopping sysroot-boot.service... Feb 9 00:52:19.436349 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 00:52:19.437159 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 00:52:19.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.439627 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 00:52:19.440399 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 00:52:19.442166 ignition[866]: INFO : Ignition 2.14.0 Feb 9 00:52:19.442166 ignition[866]: INFO : Stage: umount Feb 9 00:52:19.442166 ignition[866]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 00:52:19.442166 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 00:52:19.442166 ignition[866]: INFO : umount: umount passed Feb 9 00:52:19.442166 ignition[866]: INFO : Ignition finished successfully Feb 9 00:52:19.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.446902 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 00:52:19.447640 systemd[1]: Stopped iscsid.service. Feb 9 00:52:19.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.448995 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 00:52:19.449064 systemd[1]: Stopped ignition-mount.service. Feb 9 00:52:19.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.451763 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 00:52:19.452434 systemd[1]: Finished initrd-cleanup.service. Feb 9 00:52:19.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.454553 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 00:52:19.456127 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 00:52:19.456767 systemd[1]: Stopped sysroot-boot.service. Feb 9 00:52:19.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.457866 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 00:52:19.457894 systemd[1]: Closed iscsid.socket. Feb 9 00:52:19.459292 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 00:52:19.459326 systemd[1]: Stopped ignition-disks.service. Feb 9 00:52:19.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.460920 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 00:52:19.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.460949 systemd[1]: Stopped ignition-kargs.service. Feb 9 00:52:19.462108 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 00:52:19.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.462135 systemd[1]: Stopped ignition-setup.service. Feb 9 00:52:19.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.463185 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 00:52:19.463807 systemd[1]: Stopped initrd-setup-root.service. Feb 9 00:52:19.464905 systemd[1]: Stopping iscsiuio.service... Feb 9 00:52:19.468110 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 00:52:19.468731 systemd[1]: Stopped iscsiuio.service. Feb 9 00:52:19.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.469752 systemd[1]: Stopped target network.target. Feb 9 00:52:19.470780 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 00:52:19.470808 systemd[1]: Closed iscsiuio.socket. Feb 9 00:52:19.472259 systemd[1]: Stopping systemd-networkd.service... Feb 9 00:52:19.473403 systemd[1]: Stopping systemd-resolved.service... Feb 9 00:52:19.476105 systemd-networkd[709]: eth0: DHCPv6 lease lost Feb 9 00:52:19.476979 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 00:52:19.477672 systemd[1]: Stopped systemd-networkd.service. Feb 9 00:52:19.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.479258 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 00:52:19.479289 systemd[1]: Closed systemd-networkd.socket. Feb 9 00:52:19.481510 systemd[1]: Stopping network-cleanup.service... Feb 9 00:52:19.482538 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 00:52:19.483000 audit: BPF prog-id=9 op=UNLOAD Feb 9 00:52:19.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.482574 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 00:52:19.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.483932 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 00:52:19.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.483963 systemd[1]: Stopped systemd-sysctl.service. Feb 9 00:52:19.485154 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 00:52:19.485184 systemd[1]: Stopped systemd-modules-load.service. Feb 9 00:52:19.486569 systemd[1]: Stopping systemd-udevd.service... Feb 9 00:52:19.490467 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 00:52:19.491014 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 00:52:19.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.491147 systemd[1]: Stopped systemd-resolved.service. Feb 9 00:52:19.494833 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 00:52:19.495000 audit: BPF prog-id=6 op=UNLOAD Feb 9 00:52:19.495553 systemd[1]: Stopped systemd-udevd.service. Feb 9 00:52:19.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.496953 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 00:52:19.497668 systemd[1]: Stopped network-cleanup.service. Feb 9 00:52:19.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.498788 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 00:52:19.498821 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 00:52:19.500543 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 00:52:19.500572 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 00:52:19.502339 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 00:52:19.502376 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 00:52:19.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.504009 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 00:52:19.504038 systemd[1]: Stopped dracut-cmdline.service. Feb 9 00:52:19.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.505610 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 00:52:19.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.505640 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 00:52:19.507992 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 00:52:19.509141 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 00:52:19.509184 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 00:52:19.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.511103 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 00:52:19.511743 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 00:52:19.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.512810 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 00:52:19.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.512841 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 00:52:19.515392 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 00:52:19.516693 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 00:52:19.517447 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 00:52:19.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:19.518752 systemd[1]: Reached target initrd-switch-root.target. Feb 9 00:52:19.520543 systemd[1]: Starting initrd-switch-root.service... Feb 9 00:52:19.536056 systemd[1]: Switching root. Feb 9 00:52:19.552331 systemd-journald[198]: Journal stopped Feb 9 00:52:22.362927 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Feb 9 00:52:22.362972 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 00:52:22.362984 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 00:52:22.363003 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 00:52:22.363012 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 00:52:22.363021 kernel: SELinux: policy capability open_perms=1 Feb 9 00:52:22.363036 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 00:52:22.363046 kernel: SELinux: policy capability always_check_network=0 Feb 9 00:52:22.363055 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 00:52:22.363064 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 00:52:22.363081 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 00:52:22.363090 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 00:52:22.363102 systemd[1]: Successfully loaded SELinux policy in 35.253ms. Feb 9 00:52:22.363120 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.366ms. Feb 9 00:52:22.363131 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 00:52:22.363142 systemd[1]: Detected virtualization kvm. Feb 9 00:52:22.363151 systemd[1]: Detected architecture x86-64. Feb 9 00:52:22.363161 systemd[1]: Detected first boot. Feb 9 00:52:22.363171 systemd[1]: Initializing machine ID from VM UUID. Feb 9 00:52:22.363181 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 00:52:22.363192 systemd[1]: Populated /etc with preset unit settings. Feb 9 00:52:22.363202 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 00:52:22.363215 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 00:52:22.363226 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 00:52:22.363236 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 00:52:22.363247 systemd[1]: Stopped initrd-switch-root.service. Feb 9 00:52:22.363257 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 00:52:22.363269 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 00:52:22.363278 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 00:52:22.363288 systemd[1]: Created slice system-getty.slice. Feb 9 00:52:22.363298 systemd[1]: Created slice system-modprobe.slice. Feb 9 00:52:22.363308 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 00:52:22.363318 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 00:52:22.363328 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 00:52:22.363338 systemd[1]: Created slice user.slice. Feb 9 00:52:22.363348 systemd[1]: Started systemd-ask-password-console.path. Feb 9 00:52:22.363358 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 00:52:22.363369 systemd[1]: Set up automount boot.automount. Feb 9 00:52:22.363379 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 00:52:22.363390 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 00:52:22.363400 systemd[1]: Stopped target initrd-fs.target. Feb 9 00:52:22.363410 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 00:52:22.363420 systemd[1]: Reached target integritysetup.target. Feb 9 00:52:22.363433 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 00:52:22.363444 systemd[1]: Reached target remote-fs.target. Feb 9 00:52:22.363454 systemd[1]: Reached target slices.target. Feb 9 00:52:22.363464 systemd[1]: Reached target swap.target. Feb 9 00:52:22.363474 systemd[1]: Reached target torcx.target. Feb 9 00:52:22.363484 systemd[1]: Reached target veritysetup.target. Feb 9 00:52:22.363493 systemd[1]: Listening on systemd-coredump.socket. Feb 9 00:52:22.363503 systemd[1]: Listening on systemd-initctl.socket. Feb 9 00:52:22.363513 systemd[1]: Listening on systemd-networkd.socket. Feb 9 00:52:22.363523 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 00:52:22.363533 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 00:52:22.363544 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 00:52:22.363554 systemd[1]: Mounting dev-hugepages.mount... Feb 9 00:52:22.363563 systemd[1]: Mounting dev-mqueue.mount... Feb 9 00:52:22.363573 systemd[1]: Mounting media.mount... Feb 9 00:52:22.363586 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 00:52:22.363597 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 00:52:22.363607 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 00:52:22.363617 systemd[1]: Mounting tmp.mount... Feb 9 00:52:22.364125 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 00:52:22.364144 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 00:52:22.364157 systemd[1]: Starting kmod-static-nodes.service... Feb 9 00:52:22.364168 systemd[1]: Starting modprobe@configfs.service... Feb 9 00:52:22.364178 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 00:52:22.364188 systemd[1]: Starting modprobe@drm.service... Feb 9 00:52:22.364198 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 00:52:22.364208 systemd[1]: Starting modprobe@fuse.service... Feb 9 00:52:22.364218 systemd[1]: Starting modprobe@loop.service... Feb 9 00:52:22.364228 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 00:52:22.364242 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 00:52:22.364251 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 00:52:22.364261 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 00:52:22.364274 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 00:52:22.364287 kernel: fuse: init (API version 7.34) Feb 9 00:52:22.364297 systemd[1]: Stopped systemd-journald.service. Feb 9 00:52:22.364307 kernel: loop: module loaded Feb 9 00:52:22.364317 systemd[1]: Starting systemd-journald.service... Feb 9 00:52:22.364327 systemd[1]: Starting systemd-modules-load.service... Feb 9 00:52:22.364338 systemd[1]: Starting systemd-network-generator.service... Feb 9 00:52:22.364348 systemd[1]: Starting systemd-remount-fs.service... Feb 9 00:52:22.364358 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 00:52:22.364368 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 00:52:22.364378 systemd[1]: Stopped verity-setup.service. Feb 9 00:52:22.364388 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 00:52:22.364402 systemd[1]: Mounted dev-hugepages.mount. Feb 9 00:52:22.364412 systemd[1]: Mounted dev-mqueue.mount. Feb 9 00:52:22.364422 systemd[1]: Mounted media.mount. Feb 9 00:52:22.364435 systemd-journald[988]: Journal started Feb 9 00:52:22.364473 systemd-journald[988]: Runtime Journal (/run/log/journal/0e1eaa3281754878a4981c468d51fad7) is 6.0M, max 48.4M, 42.4M free. Feb 9 00:52:19.606000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 00:52:19.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 00:52:19.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 00:52:19.980000 audit: BPF prog-id=10 op=LOAD Feb 9 00:52:19.980000 audit: BPF prog-id=10 op=UNLOAD Feb 9 00:52:19.980000 audit: BPF prog-id=11 op=LOAD Feb 9 00:52:19.980000 audit: BPF prog-id=11 op=UNLOAD Feb 9 00:52:20.010000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 00:52:20.010000 audit[899]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:20.010000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 00:52:20.011000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 00:52:20.011000 audit[899]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879b9 a2=1ed a3=0 items=2 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:20.011000 audit: CWD cwd="/" Feb 9 00:52:20.011000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:20.011000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:20.011000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 00:52:22.178000 audit: BPF prog-id=12 op=LOAD Feb 9 00:52:22.178000 audit: BPF prog-id=3 op=UNLOAD Feb 9 00:52:22.178000 audit: BPF prog-id=13 op=LOAD Feb 9 00:52:22.178000 audit: BPF prog-id=14 op=LOAD Feb 9 00:52:22.178000 audit: BPF prog-id=4 op=UNLOAD Feb 9 00:52:22.178000 audit: BPF prog-id=5 op=UNLOAD Feb 9 00:52:22.179000 audit: BPF prog-id=15 op=LOAD Feb 9 00:52:22.179000 audit: BPF prog-id=12 op=UNLOAD Feb 9 00:52:22.179000 audit: BPF prog-id=16 op=LOAD Feb 9 00:52:22.179000 audit: BPF prog-id=17 op=LOAD Feb 9 00:52:22.179000 audit: BPF prog-id=13 op=UNLOAD Feb 9 00:52:22.179000 audit: BPF prog-id=14 op=UNLOAD Feb 9 00:52:22.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.193000 audit: BPF prog-id=15 op=UNLOAD Feb 9 00:52:22.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.346000 audit: BPF prog-id=18 op=LOAD Feb 9 00:52:22.366241 systemd[1]: Started systemd-journald.service. Feb 9 00:52:22.346000 audit: BPF prog-id=19 op=LOAD Feb 9 00:52:22.346000 audit: BPF prog-id=20 op=LOAD Feb 9 00:52:22.346000 audit: BPF prog-id=16 op=UNLOAD Feb 9 00:52:22.346000 audit: BPF prog-id=17 op=UNLOAD Feb 9 00:52:22.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.361000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 00:52:22.361000 audit[988]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe611fb0d0 a2=4000 a3=7ffe611fb16c items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:22.361000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 00:52:22.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:20.009598 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 00:52:22.177360 systemd[1]: Queued start job for default target multi-user.target. Feb 9 00:52:20.009780 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 00:52:22.177370 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 00:52:20.009797 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 00:52:22.180241 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 00:52:22.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:20.009823 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 00:52:22.366351 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 00:52:22.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:20.009833 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 00:52:22.366939 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 00:52:20.009859 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 00:52:22.367532 systemd[1]: Mounted tmp.mount. Feb 9 00:52:20.009871 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 00:52:22.368289 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 00:52:20.010065 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 00:52:22.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.369023 systemd[1]: Finished kmod-static-nodes.service. Feb 9 00:52:20.010106 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 00:52:22.369762 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 00:52:20.010118 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 00:52:22.369878 systemd[1]: Finished modprobe@configfs.service. Feb 9 00:52:20.010375 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 00:52:22.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.370649 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 00:52:20.010406 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 00:52:22.370756 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 00:52:20.010422 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 00:52:22.371512 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 00:52:20.010436 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 00:52:22.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.371630 systemd[1]: Finished modprobe@drm.service. Feb 9 00:52:20.010451 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 00:52:20.010464 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 00:52:21.938836 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:21Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 00:52:22.372374 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 00:52:22.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:21.939095 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:21Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 00:52:22.372482 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 00:52:21.939178 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:21Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 00:52:21.939319 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:21Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 00:52:21.939369 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:21Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 00:52:22.373301 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 00:52:21.939418 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T00:52:21Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 00:52:22.373418 systemd[1]: Finished modprobe@fuse.service. Feb 9 00:52:22.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.374261 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 00:52:22.374385 systemd[1]: Finished modprobe@loop.service. Feb 9 00:52:22.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.375144 systemd[1]: Finished systemd-modules-load.service. Feb 9 00:52:22.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.375907 systemd[1]: Finished systemd-network-generator.service. Feb 9 00:52:22.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.376698 systemd[1]: Finished systemd-remount-fs.service. Feb 9 00:52:22.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.377565 systemd[1]: Reached target network-pre.target. Feb 9 00:52:22.378963 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 00:52:22.380267 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 00:52:22.380761 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 00:52:22.381760 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 00:52:22.383053 systemd[1]: Starting systemd-journal-flush.service... Feb 9 00:52:22.383917 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 00:52:22.390292 systemd-journald[988]: Time spent on flushing to /var/log/journal/0e1eaa3281754878a4981c468d51fad7 is 17.549ms for 1170 entries. Feb 9 00:52:22.390292 systemd-journald[988]: System Journal (/var/log/journal/0e1eaa3281754878a4981c468d51fad7) is 8.0M, max 195.6M, 187.6M free. Feb 9 00:52:22.434350 systemd-journald[988]: Received client request to flush runtime journal. Feb 9 00:52:22.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.385711 systemd[1]: Starting systemd-random-seed.service... Feb 9 00:52:22.386331 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 00:52:22.387064 systemd[1]: Starting systemd-sysctl.service... Feb 9 00:52:22.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.388365 systemd[1]: Starting systemd-sysusers.service... Feb 9 00:52:22.391570 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 00:52:22.435978 udevadm[1005]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 00:52:22.392641 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 00:52:22.398202 systemd[1]: Finished systemd-sysctl.service. Feb 9 00:52:22.403275 systemd[1]: Finished systemd-sysusers.service. Feb 9 00:52:22.404916 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 00:52:22.405939 systemd[1]: Finished systemd-random-seed.service. Feb 9 00:52:22.408052 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 00:52:22.409062 systemd[1]: Reached target first-boot-complete.target. Feb 9 00:52:22.412953 systemd[1]: Starting systemd-udev-settle.service... Feb 9 00:52:22.427110 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 00:52:22.435012 systemd[1]: Finished systemd-journal-flush.service. Feb 9 00:52:22.824420 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 00:52:22.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.825000 audit: BPF prog-id=21 op=LOAD Feb 9 00:52:22.825000 audit: BPF prog-id=22 op=LOAD Feb 9 00:52:22.825000 audit: BPF prog-id=7 op=UNLOAD Feb 9 00:52:22.825000 audit: BPF prog-id=8 op=UNLOAD Feb 9 00:52:22.826205 systemd[1]: Starting systemd-udevd.service... Feb 9 00:52:22.841179 systemd-udevd[1007]: Using default interface naming scheme 'v252'. Feb 9 00:52:22.853541 systemd[1]: Started systemd-udevd.service. Feb 9 00:52:22.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.854000 audit: BPF prog-id=23 op=LOAD Feb 9 00:52:22.855293 systemd[1]: Starting systemd-networkd.service... Feb 9 00:52:22.860000 audit: BPF prog-id=24 op=LOAD Feb 9 00:52:22.860000 audit: BPF prog-id=25 op=LOAD Feb 9 00:52:22.860000 audit: BPF prog-id=26 op=LOAD Feb 9 00:52:22.860853 systemd[1]: Starting systemd-userdbd.service... Feb 9 00:52:22.878595 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 00:52:22.884525 systemd[1]: Started systemd-userdbd.service. Feb 9 00:52:22.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.902020 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 00:52:22.915093 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 00:52:22.923938 systemd-networkd[1014]: lo: Link UP Feb 9 00:52:22.923951 systemd-networkd[1014]: lo: Gained carrier Feb 9 00:52:22.924305 systemd-networkd[1014]: Enumeration completed Feb 9 00:52:22.924387 systemd-networkd[1014]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 00:52:22.924388 systemd[1]: Started systemd-networkd.service. Feb 9 00:52:22.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:22.925819 systemd-networkd[1014]: eth0: Link UP Feb 9 00:52:22.925828 systemd-networkd[1014]: eth0: Gained carrier Feb 9 00:52:22.930127 kernel: ACPI: button: Power Button [PWRF] Feb 9 00:52:22.937177 systemd-networkd[1014]: eth0: DHCPv4 address 10.0.0.120/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 00:52:22.932000 audit[1009]: AVC avc: denied { confidentiality } for pid=1009 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 00:52:22.932000 audit[1009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d53eb0bea0 a1=32194 a2=7f39134f2bc5 a3=5 items=108 ppid=1007 pid=1009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:22.932000 audit: CWD cwd="/" Feb 9 00:52:22.932000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=1 name=(null) inode=15415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=2 name=(null) inode=15415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=3 name=(null) inode=15416 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=4 name=(null) inode=15415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=5 name=(null) inode=15417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=6 name=(null) inode=15415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=7 name=(null) inode=15418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=8 name=(null) inode=15418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=9 name=(null) inode=15419 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=10 name=(null) inode=15418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=11 name=(null) inode=15420 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=12 name=(null) inode=15418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=13 name=(null) inode=15421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=14 name=(null) inode=15418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=15 name=(null) inode=15422 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=16 name=(null) inode=15418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=17 name=(null) inode=15423 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=18 name=(null) inode=15415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=19 name=(null) inode=15424 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=20 name=(null) inode=15424 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=21 name=(null) inode=15425 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=22 name=(null) inode=15424 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=23 name=(null) inode=15426 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=24 name=(null) inode=15424 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=25 name=(null) inode=15427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=26 name=(null) inode=15424 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=27 name=(null) inode=15428 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=28 name=(null) inode=15424 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=29 name=(null) inode=15429 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=30 name=(null) inode=15415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=31 name=(null) inode=15430 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=32 name=(null) inode=15430 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=33 name=(null) inode=15431 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=34 name=(null) inode=15430 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=35 name=(null) inode=15432 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=36 name=(null) inode=15430 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=37 name=(null) inode=15433 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=38 name=(null) inode=15430 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=39 name=(null) inode=15434 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=40 name=(null) inode=15430 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=41 name=(null) inode=15435 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=42 name=(null) inode=15415 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=43 name=(null) inode=15436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=44 name=(null) inode=15436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=45 name=(null) inode=15437 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=46 name=(null) inode=15436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=47 name=(null) inode=15438 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=48 name=(null) inode=15436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=49 name=(null) inode=15439 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=50 name=(null) inode=15436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=51 name=(null) inode=15440 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=52 name=(null) inode=15436 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=53 name=(null) inode=15441 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=55 name=(null) inode=15442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=56 name=(null) inode=15442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=57 name=(null) inode=15443 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=58 name=(null) inode=15442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=59 name=(null) inode=15444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=60 name=(null) inode=15442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=61 name=(null) inode=15445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=62 name=(null) inode=15445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=63 name=(null) inode=15446 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=64 name=(null) inode=15445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=65 name=(null) inode=15447 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=66 name=(null) inode=15445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=67 name=(null) inode=15448 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=68 name=(null) inode=15445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=69 name=(null) inode=15449 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=70 name=(null) inode=15445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=71 name=(null) inode=15450 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=72 name=(null) inode=15442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=73 name=(null) inode=15451 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=74 name=(null) inode=15451 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=75 name=(null) inode=15452 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=76 name=(null) inode=15451 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=77 name=(null) inode=15453 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=78 name=(null) inode=15451 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=79 name=(null) inode=15454 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=80 name=(null) inode=15451 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=81 name=(null) inode=15455 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=82 name=(null) inode=15451 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=83 name=(null) inode=15456 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=84 name=(null) inode=15442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=85 name=(null) inode=15457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=86 name=(null) inode=15457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=87 name=(null) inode=15458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=88 name=(null) inode=15457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=89 name=(null) inode=15459 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=90 name=(null) inode=15457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=91 name=(null) inode=15460 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=92 name=(null) inode=15457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=93 name=(null) inode=15461 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=94 name=(null) inode=15457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=95 name=(null) inode=15462 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=96 name=(null) inode=15442 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=97 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=98 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=99 name=(null) inode=15464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=100 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=101 name=(null) inode=15465 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=102 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=103 name=(null) inode=15466 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=104 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=105 name=(null) inode=15467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=106 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PATH item=107 name=(null) inode=15468 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:52:22.932000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 00:52:22.953120 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 00:52:22.956107 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Feb 9 00:52:22.979149 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 00:52:22.998361 kernel: kvm: Nested Virtualization enabled Feb 9 00:52:22.998469 kernel: SVM: kvm: Nested Paging enabled Feb 9 00:52:22.998506 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 9 00:52:22.998578 kernel: SVM: Virtual GIF supported Feb 9 00:52:23.011100 kernel: EDAC MC: Ver: 3.0.0 Feb 9 00:52:23.031449 systemd[1]: Finished systemd-udev-settle.service. Feb 9 00:52:23.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.033118 systemd[1]: Starting lvm2-activation-early.service... Feb 9 00:52:23.040146 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 00:52:23.064600 systemd[1]: Finished lvm2-activation-early.service. Feb 9 00:52:23.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.065288 systemd[1]: Reached target cryptsetup.target. Feb 9 00:52:23.066606 systemd[1]: Starting lvm2-activation.service... Feb 9 00:52:23.070039 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 00:52:23.093620 systemd[1]: Finished lvm2-activation.service. Feb 9 00:52:23.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.094285 systemd[1]: Reached target local-fs-pre.target. Feb 9 00:52:23.094878 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 00:52:23.094899 systemd[1]: Reached target local-fs.target. Feb 9 00:52:23.095466 systemd[1]: Reached target machines.target. Feb 9 00:52:23.096798 systemd[1]: Starting ldconfig.service... Feb 9 00:52:23.097478 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 00:52:23.097523 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 00:52:23.098296 systemd[1]: Starting systemd-boot-update.service... Feb 9 00:52:23.099672 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 00:52:23.101333 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 00:52:23.102105 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 00:52:23.102137 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 00:52:23.102873 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 00:52:23.103802 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1047 (bootctl) Feb 9 00:52:23.104850 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 00:52:23.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.110426 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 00:52:23.111683 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 00:52:23.112268 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 00:52:23.113356 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 00:52:23.139329 systemd-fsck[1056]: fsck.fat 4.2 (2021-01-31) Feb 9 00:52:23.139329 systemd-fsck[1056]: /dev/vda1: 790 files, 115355/258078 clusters Feb 9 00:52:23.140374 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 00:52:23.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.142719 systemd[1]: Mounting boot.mount... Feb 9 00:52:23.151732 systemd[1]: Mounted boot.mount. Feb 9 00:52:23.163736 systemd[1]: Finished systemd-boot-update.service. Feb 9 00:52:23.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.631226 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 00:52:23.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.633787 systemd[1]: Starting audit-rules.service... Feb 9 00:52:23.634693 ldconfig[1046]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 00:52:23.635676 systemd[1]: Starting clean-ca-certificates.service... Feb 9 00:52:23.637547 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 00:52:23.639000 audit: BPF prog-id=27 op=LOAD Feb 9 00:52:23.641000 audit: BPF prog-id=28 op=LOAD Feb 9 00:52:23.639840 systemd[1]: Starting systemd-resolved.service... Feb 9 00:52:23.641619 systemd[1]: Starting systemd-timesyncd.service... Feb 9 00:52:23.643712 systemd[1]: Starting systemd-update-utmp.service... Feb 9 00:52:23.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.645102 systemd[1]: Finished clean-ca-certificates.service. Feb 9 00:52:23.646295 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 00:52:23.648000 audit[1071]: SYSTEM_BOOT pid=1071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.651867 systemd[1]: Finished systemd-update-utmp.service. Feb 9 00:52:23.821055 systemd[1]: Started systemd-timesyncd.service. Feb 9 00:52:23.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.822096 systemd-timesyncd[1067]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 00:52:23.822105 systemd[1]: Reached target time-set.target. Feb 9 00:52:23.822140 systemd-timesyncd[1067]: Initial clock synchronization to Fri 2024-02-09 00:52:23.815247 UTC. Feb 9 00:52:23.831890 systemd-resolved[1066]: Positive Trust Anchors: Feb 9 00:52:23.831907 systemd-resolved[1066]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 00:52:23.831933 systemd-resolved[1066]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 00:52:23.833531 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 00:52:23.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:23.837000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 00:52:23.837000 audit[1081]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc239d1f30 a2=420 a3=0 items=0 ppid=1060 pid=1081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:23.837000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 00:52:23.837705 augenrules[1081]: No rules Feb 9 00:52:23.837970 systemd[1]: Finished audit-rules.service. Feb 9 00:52:23.839648 systemd[1]: Finished ldconfig.service. Feb 9 00:52:23.841412 systemd[1]: Starting systemd-update-done.service... Feb 9 00:52:23.849837 systemd-resolved[1066]: Defaulting to hostname 'linux'. Feb 9 00:52:23.851223 systemd[1]: Started systemd-resolved.service. Feb 9 00:52:23.852131 systemd[1]: Reached target network.target. Feb 9 00:52:23.852876 systemd[1]: Reached target nss-lookup.target. Feb 9 00:52:23.854323 systemd[1]: Finished systemd-update-done.service. Feb 9 00:52:23.855157 systemd[1]: Reached target sysinit.target. Feb 9 00:52:23.855900 systemd[1]: Started motdgen.path. Feb 9 00:52:23.856633 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 00:52:23.857803 systemd[1]: Started logrotate.timer. Feb 9 00:52:23.858567 systemd[1]: Started mdadm.timer. Feb 9 00:52:23.859205 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 00:52:23.860061 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 00:52:23.860102 systemd[1]: Reached target paths.target. Feb 9 00:52:23.860890 systemd[1]: Reached target timers.target. Feb 9 00:52:23.861990 systemd[1]: Listening on dbus.socket. Feb 9 00:52:23.863611 systemd[1]: Starting docker.socket... Feb 9 00:52:23.866053 systemd[1]: Listening on sshd.socket. Feb 9 00:52:23.866820 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 00:52:23.868141 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 00:52:23.868646 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 00:52:23.869569 systemd[1]: Listening on docker.socket. Feb 9 00:52:23.870339 systemd[1]: Reached target sockets.target. Feb 9 00:52:23.871020 systemd[1]: Reached target basic.target. Feb 9 00:52:23.871783 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 00:52:23.871809 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 00:52:23.872651 systemd[1]: Starting containerd.service... Feb 9 00:52:23.874155 systemd[1]: Starting dbus.service... Feb 9 00:52:23.875794 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 00:52:23.877473 systemd[1]: Starting extend-filesystems.service... Feb 9 00:52:23.878632 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 00:52:23.879486 jq[1092]: false Feb 9 00:52:23.879576 systemd[1]: Starting motdgen.service... Feb 9 00:52:23.881082 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 00:52:23.882759 systemd[1]: Starting prepare-critools.service... Feb 9 00:52:23.884613 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 00:52:23.886565 systemd[1]: Starting sshd-keygen.service... Feb 9 00:52:23.889638 systemd[1]: Starting systemd-logind.service... Feb 9 00:52:23.891664 dbus-daemon[1091]: [system] SELinux support is enabled Feb 9 00:52:23.894246 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 00:52:23.897467 extend-filesystems[1093]: Found sr0 Feb 9 00:52:23.897467 extend-filesystems[1093]: Found vda Feb 9 00:52:23.897467 extend-filesystems[1093]: Found vda1 Feb 9 00:52:23.897467 extend-filesystems[1093]: Found vda2 Feb 9 00:52:23.897467 extend-filesystems[1093]: Found vda3 Feb 9 00:52:23.897467 extend-filesystems[1093]: Found usr Feb 9 00:52:23.897467 extend-filesystems[1093]: Found vda4 Feb 9 00:52:23.897467 extend-filesystems[1093]: Found vda6 Feb 9 00:52:23.897467 extend-filesystems[1093]: Found vda7 Feb 9 00:52:23.897467 extend-filesystems[1093]: Found vda9 Feb 9 00:52:23.897467 extend-filesystems[1093]: Checking size of /dev/vda9 Feb 9 00:52:23.894296 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 00:52:23.894769 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 00:52:23.909635 jq[1113]: true Feb 9 00:52:23.895496 systemd[1]: Starting update-engine.service... Feb 9 00:52:23.896861 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 00:52:23.900166 systemd[1]: Started dbus.service. Feb 9 00:52:23.907755 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 00:52:23.907922 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 00:52:23.908194 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 00:52:23.908352 systemd[1]: Finished motdgen.service. Feb 9 00:52:23.912593 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 00:52:23.912751 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 00:52:23.915340 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 00:52:23.915370 systemd[1]: Reached target system-config.target. Feb 9 00:52:23.916223 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 00:52:23.917248 jq[1118]: true Feb 9 00:52:23.916244 systemd[1]: Reached target user-config.target. Feb 9 00:52:23.918277 tar[1116]: ./ Feb 9 00:52:23.918277 tar[1116]: ./loopback Feb 9 00:52:23.922502 tar[1117]: crictl Feb 9 00:52:23.923535 extend-filesystems[1093]: Resized partition /dev/vda9 Feb 9 00:52:23.927840 extend-filesystems[1129]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 00:52:23.934128 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 00:52:23.951347 update_engine[1111]: I0209 00:52:23.951049 1111 main.cc:92] Flatcar Update Engine starting Feb 9 00:52:23.958215 update_engine[1111]: I0209 00:52:23.952623 1111 update_check_scheduler.cc:74] Next update check in 5m4s Feb 9 00:52:23.953365 systemd[1]: Started update-engine.service. Feb 9 00:52:23.955427 systemd[1]: Started locksmithd.service. Feb 9 00:52:23.956915 systemd-logind[1104]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 00:52:23.956932 systemd-logind[1104]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 00:52:23.958555 systemd-logind[1104]: New seat seat0. Feb 9 00:52:23.968517 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 00:52:23.965697 systemd[1]: Started systemd-logind.service. Feb 9 00:52:23.983962 env[1119]: time="2024-02-09T00:52:23.965719631Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 00:52:23.986271 extend-filesystems[1129]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 00:52:23.986271 extend-filesystems[1129]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 00:52:23.986271 extend-filesystems[1129]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 00:52:23.989277 extend-filesystems[1093]: Resized filesystem in /dev/vda9 Feb 9 00:52:23.990012 bash[1145]: Updated "/home/core/.ssh/authorized_keys" Feb 9 00:52:23.990150 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 00:52:23.990333 systemd[1]: Finished extend-filesystems.service. Feb 9 00:52:23.991543 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 00:52:23.992304 env[1119]: time="2024-02-09T00:52:23.992272919Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 00:52:23.992510 env[1119]: time="2024-02-09T00:52:23.992490146Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999046 env[1119]: time="2024-02-09T00:52:23.998996716Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999046 env[1119]: time="2024-02-09T00:52:23.999039827Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999321 env[1119]: time="2024-02-09T00:52:23.999292631Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999321 env[1119]: time="2024-02-09T00:52:23.999313390Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999401 env[1119]: time="2024-02-09T00:52:23.999326104Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 00:52:23.999401 env[1119]: time="2024-02-09T00:52:23.999336824Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999401 env[1119]: time="2024-02-09T00:52:23.999396516Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999608 env[1119]: time="2024-02-09T00:52:23.999587043Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999721 env[1119]: time="2024-02-09T00:52:23.999699965Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 00:52:23.999721 env[1119]: time="2024-02-09T00:52:23.999717137Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 00:52:23.999803 env[1119]: time="2024-02-09T00:52:23.999757653Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 00:52:23.999803 env[1119]: time="2024-02-09T00:52:23.999768563Z" level=info msg="metadata content store policy set" policy=shared Feb 9 00:52:24.004179 env[1119]: time="2024-02-09T00:52:24.004152987Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 00:52:24.004222 env[1119]: time="2024-02-09T00:52:24.004182480Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 00:52:24.004222 env[1119]: time="2024-02-09T00:52:24.004196690Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 00:52:24.004286 env[1119]: time="2024-02-09T00:52:24.004225632Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004286 env[1119]: time="2024-02-09T00:52:24.004240044Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004286 env[1119]: time="2024-02-09T00:52:24.004252831Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004286 env[1119]: time="2024-02-09T00:52:24.004264289Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004286 env[1119]: time="2024-02-09T00:52:24.004277418Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004379 env[1119]: time="2024-02-09T00:52:24.004289555Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004379 env[1119]: time="2024-02-09T00:52:24.004303536Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004379 env[1119]: time="2024-02-09T00:52:24.004314712Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004379 env[1119]: time="2024-02-09T00:52:24.004325727Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 00:52:24.004452 env[1119]: time="2024-02-09T00:52:24.004403771Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 00:52:24.004475 env[1119]: time="2024-02-09T00:52:24.004466542Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 00:52:24.004687 env[1119]: time="2024-02-09T00:52:24.004662026Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 00:52:24.004731 env[1119]: time="2024-02-09T00:52:24.004691528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004731 env[1119]: time="2024-02-09T00:52:24.004704588Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 00:52:24.004771 env[1119]: time="2024-02-09T00:52:24.004740430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004771 env[1119]: time="2024-02-09T00:52:24.004752487Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004771 env[1119]: time="2024-02-09T00:52:24.004763704Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004829 env[1119]: time="2024-02-09T00:52:24.004777955Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004829 env[1119]: time="2024-02-09T00:52:24.004790232Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004829 env[1119]: time="2024-02-09T00:52:24.004801118Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004829 env[1119]: time="2024-02-09T00:52:24.004811302Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004829 env[1119]: time="2024-02-09T00:52:24.004821046Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004923 env[1119]: time="2024-02-09T00:52:24.004833415Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 00:52:24.004956 env[1119]: time="2024-02-09T00:52:24.004927481Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004956 env[1119]: time="2024-02-09T00:52:24.004941141Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004997 env[1119]: time="2024-02-09T00:52:24.004962152Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.004997 env[1119]: time="2024-02-09T00:52:24.004974048Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 00:52:24.004997 env[1119]: time="2024-02-09T00:52:24.004985696Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 00:52:24.004997 env[1119]: time="2024-02-09T00:52:24.004996211Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 00:52:24.005093 env[1119]: time="2024-02-09T00:52:24.005012284Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 00:52:24.005093 env[1119]: time="2024-02-09T00:52:24.005044662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 00:52:24.005272 env[1119]: time="2024-02-09T00:52:24.005218835Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 00:52:24.005272 env[1119]: time="2024-02-09T00:52:24.005270279Z" level=info msg="Connect containerd service" Feb 9 00:52:24.005822 env[1119]: time="2024-02-09T00:52:24.005300743Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 00:52:24.005822 env[1119]: time="2024-02-09T00:52:24.005742524Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 00:52:24.005989 env[1119]: time="2024-02-09T00:52:24.005965809Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 00:52:24.006035 env[1119]: time="2024-02-09T00:52:24.006002972Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 00:52:24.006057 env[1119]: time="2024-02-09T00:52:24.006040216Z" level=info msg="containerd successfully booted in 0.054282s" Feb 9 00:52:24.006148 systemd[1]: Started containerd.service. Feb 9 00:52:24.007203 systemd-networkd[1014]: eth0: Gained IPv6LL Feb 9 00:52:24.007955 env[1119]: time="2024-02-09T00:52:24.007890342Z" level=info msg="Start subscribing containerd event" Feb 9 00:52:24.008000 env[1119]: time="2024-02-09T00:52:24.007975786Z" level=info msg="Start recovering state" Feb 9 00:52:24.008066 env[1119]: time="2024-02-09T00:52:24.008045787Z" level=info msg="Start event monitor" Feb 9 00:52:24.008066 env[1119]: time="2024-02-09T00:52:24.008067459Z" level=info msg="Start snapshots syncer" Feb 9 00:52:24.008158 env[1119]: time="2024-02-09T00:52:24.008091945Z" level=info msg="Start cni network conf syncer for default" Feb 9 00:52:24.008158 env[1119]: time="2024-02-09T00:52:24.008100557Z" level=info msg="Start streaming server" Feb 9 00:52:24.014466 tar[1116]: ./bandwidth Feb 9 00:52:24.026417 locksmithd[1146]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 00:52:24.047281 tar[1116]: ./ptp Feb 9 00:52:24.081153 tar[1116]: ./vlan Feb 9 00:52:24.114913 tar[1116]: ./host-device Feb 9 00:52:24.154065 tar[1116]: ./tuning Feb 9 00:52:24.185592 tar[1116]: ./vrf Feb 9 00:52:24.215544 tar[1116]: ./sbr Feb 9 00:52:24.244580 tar[1116]: ./tap Feb 9 00:52:24.278139 tar[1116]: ./dhcp Feb 9 00:52:24.362700 tar[1116]: ./static Feb 9 00:52:24.386758 tar[1116]: ./firewall Feb 9 00:52:24.397872 systemd[1]: Finished prepare-critools.service. Feb 9 00:52:24.420662 tar[1116]: ./macvlan Feb 9 00:52:24.449684 tar[1116]: ./dummy Feb 9 00:52:24.478341 tar[1116]: ./bridge Feb 9 00:52:24.509776 tar[1116]: ./ipvlan Feb 9 00:52:24.538751 tar[1116]: ./portmap Feb 9 00:52:24.566093 tar[1116]: ./host-local Feb 9 00:52:24.574348 sshd_keygen[1110]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 00:52:24.590745 systemd[1]: Finished sshd-keygen.service. Feb 9 00:52:24.593242 systemd[1]: Starting issuegen.service... Feb 9 00:52:24.597989 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 00:52:24.598157 systemd[1]: Finished issuegen.service. Feb 9 00:52:24.599910 systemd[1]: Starting systemd-user-sessions.service... Feb 9 00:52:24.600736 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 00:52:24.605338 systemd[1]: Finished systemd-user-sessions.service. Feb 9 00:52:24.606978 systemd[1]: Started getty@tty1.service. Feb 9 00:52:24.608404 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 00:52:24.609181 systemd[1]: Reached target getty.target. Feb 9 00:52:24.609771 systemd[1]: Reached target multi-user.target. Feb 9 00:52:24.611247 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 00:52:24.616650 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 00:52:24.616765 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 00:52:24.617522 systemd[1]: Startup finished in 528ms (kernel) + 4.954s (initrd) + 5.048s (userspace) = 10.530s. Feb 9 00:52:32.942566 systemd[1]: Created slice system-sshd.slice. Feb 9 00:52:32.943439 systemd[1]: Started sshd@0-10.0.0.120:22-10.0.0.1:43700.service. Feb 9 00:52:32.981913 sshd[1176]: Accepted publickey for core from 10.0.0.1 port 43700 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:52:32.983061 sshd[1176]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:52:32.992041 systemd-logind[1104]: New session 1 of user core. Feb 9 00:52:32.993253 systemd[1]: Created slice user-500.slice. Feb 9 00:52:32.994404 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 00:52:33.001566 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 00:52:33.002979 systemd[1]: Starting user@500.service... Feb 9 00:52:33.005018 (systemd)[1179]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:52:33.065364 systemd[1179]: Queued start job for default target default.target. Feb 9 00:52:33.065731 systemd[1179]: Reached target paths.target. Feb 9 00:52:33.065749 systemd[1179]: Reached target sockets.target. Feb 9 00:52:33.065761 systemd[1179]: Reached target timers.target. Feb 9 00:52:33.065771 systemd[1179]: Reached target basic.target. Feb 9 00:52:33.065802 systemd[1179]: Reached target default.target. Feb 9 00:52:33.065823 systemd[1179]: Startup finished in 56ms. Feb 9 00:52:33.065867 systemd[1]: Started user@500.service. Feb 9 00:52:33.066886 systemd[1]: Started session-1.scope. Feb 9 00:52:33.115352 systemd[1]: Started sshd@1-10.0.0.120:22-10.0.0.1:43704.service. Feb 9 00:52:33.155920 sshd[1188]: Accepted publickey for core from 10.0.0.1 port 43704 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:52:33.157162 sshd[1188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:52:33.160318 systemd-logind[1104]: New session 2 of user core. Feb 9 00:52:33.161082 systemd[1]: Started session-2.scope. Feb 9 00:52:33.213724 sshd[1188]: pam_unix(sshd:session): session closed for user core Feb 9 00:52:33.216001 systemd[1]: sshd@1-10.0.0.120:22-10.0.0.1:43704.service: Deactivated successfully. Feb 9 00:52:33.216466 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 00:52:33.217035 systemd-logind[1104]: Session 2 logged out. Waiting for processes to exit. Feb 9 00:52:33.217978 systemd[1]: Started sshd@2-10.0.0.120:22-10.0.0.1:43708.service. Feb 9 00:52:33.218649 systemd-logind[1104]: Removed session 2. Feb 9 00:52:33.256631 sshd[1194]: Accepted publickey for core from 10.0.0.1 port 43708 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:52:33.257689 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:52:33.260399 systemd-logind[1104]: New session 3 of user core. Feb 9 00:52:33.261034 systemd[1]: Started session-3.scope. Feb 9 00:52:33.309364 sshd[1194]: pam_unix(sshd:session): session closed for user core Feb 9 00:52:33.312618 systemd[1]: Started sshd@3-10.0.0.120:22-10.0.0.1:43714.service. Feb 9 00:52:33.313025 systemd[1]: sshd@2-10.0.0.120:22-10.0.0.1:43708.service: Deactivated successfully. Feb 9 00:52:33.313516 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 00:52:33.313946 systemd-logind[1104]: Session 3 logged out. Waiting for processes to exit. Feb 9 00:52:33.314577 systemd-logind[1104]: Removed session 3. Feb 9 00:52:33.351320 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 43714 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:52:33.352219 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:52:33.354987 systemd-logind[1104]: New session 4 of user core. Feb 9 00:52:33.355687 systemd[1]: Started session-4.scope. Feb 9 00:52:33.408921 sshd[1199]: pam_unix(sshd:session): session closed for user core Feb 9 00:52:33.411118 systemd[1]: sshd@3-10.0.0.120:22-10.0.0.1:43714.service: Deactivated successfully. Feb 9 00:52:33.411545 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 00:52:33.412169 systemd-logind[1104]: Session 4 logged out. Waiting for processes to exit. Feb 9 00:52:33.412941 systemd[1]: Started sshd@4-10.0.0.120:22-10.0.0.1:43716.service. Feb 9 00:52:33.413846 systemd-logind[1104]: Removed session 4. Feb 9 00:52:33.449359 sshd[1206]: Accepted publickey for core from 10.0.0.1 port 43716 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:52:33.450432 sshd[1206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:52:33.453892 systemd-logind[1104]: New session 5 of user core. Feb 9 00:52:33.454987 systemd[1]: Started session-5.scope. Feb 9 00:52:33.507614 sudo[1209]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 00:52:33.507776 sudo[1209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 00:52:33.514298 dbus-daemon[1091]: \xd0M\xc0ϮU: received setenforce notice (enforcing=1549748096) Feb 9 00:52:33.517225 sudo[1209]: pam_unix(sudo:session): session closed for user root Feb 9 00:52:33.518859 sshd[1206]: pam_unix(sshd:session): session closed for user core Feb 9 00:52:33.521663 systemd[1]: sshd@4-10.0.0.120:22-10.0.0.1:43716.service: Deactivated successfully. Feb 9 00:52:33.522221 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 00:52:33.522832 systemd-logind[1104]: Session 5 logged out. Waiting for processes to exit. Feb 9 00:52:33.523925 systemd[1]: Started sshd@5-10.0.0.120:22-10.0.0.1:43722.service. Feb 9 00:52:33.524741 systemd-logind[1104]: Removed session 5. Feb 9 00:52:33.560147 sshd[1213]: Accepted publickey for core from 10.0.0.1 port 43722 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:52:33.560935 sshd[1213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:52:33.564265 systemd-logind[1104]: New session 6 of user core. Feb 9 00:52:33.565217 systemd[1]: Started session-6.scope. Feb 9 00:52:33.621611 sudo[1217]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 00:52:33.621841 sudo[1217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 00:52:33.624269 sudo[1217]: pam_unix(sudo:session): session closed for user root Feb 9 00:52:33.627651 sudo[1216]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 00:52:33.627808 sudo[1216]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 00:52:33.635359 systemd[1]: Stopping audit-rules.service... Feb 9 00:52:33.635000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 00:52:33.636715 auditctl[1220]: No rules Feb 9 00:52:33.636919 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 00:52:33.637096 systemd[1]: Stopped audit-rules.service. Feb 9 00:52:33.637225 kernel: kauditd_printk_skb: 242 callbacks suppressed Feb 9 00:52:33.637252 kernel: audit: type=1305 audit(1707439953.635:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 00:52:33.635000 audit[1220]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbfdc7f40 a2=420 a3=0 items=0 ppid=1 pid=1220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:33.638542 systemd[1]: Starting audit-rules.service... Feb 9 00:52:33.641427 kernel: audit: type=1300 audit(1707439953.635:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbfdc7f40 a2=420 a3=0 items=0 ppid=1 pid=1220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:33.641467 kernel: audit: type=1327 audit(1707439953.635:164): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 00:52:33.635000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 00:52:33.642319 kernel: audit: type=1131 audit(1707439953.636:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.655785 augenrules[1237]: No rules Feb 9 00:52:33.656399 systemd[1]: Finished audit-rules.service. Feb 9 00:52:33.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.657169 sudo[1216]: pam_unix(sudo:session): session closed for user root Feb 9 00:52:33.658477 sshd[1213]: pam_unix(sshd:session): session closed for user core Feb 9 00:52:33.656000 audit[1216]: USER_END pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.661461 kernel: audit: type=1130 audit(1707439953.655:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.661492 kernel: audit: type=1106 audit(1707439953.656:167): pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.661508 kernel: audit: type=1104 audit(1707439953.656:168): pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.656000 audit[1216]: CRED_DISP pid=1216 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.660736 systemd[1]: sshd@5-10.0.0.120:22-10.0.0.1:43722.service: Deactivated successfully. Feb 9 00:52:33.661165 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 00:52:33.661809 systemd-logind[1104]: Session 6 logged out. Waiting for processes to exit. Feb 9 00:52:33.662940 systemd[1]: Started sshd@6-10.0.0.120:22-10.0.0.1:43724.service. Feb 9 00:52:33.658000 audit[1213]: USER_END pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:33.663954 systemd-logind[1104]: Removed session 6. Feb 9 00:52:33.666568 kernel: audit: type=1106 audit(1707439953.658:169): pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:33.666623 kernel: audit: type=1104 audit(1707439953.658:170): pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:33.658000 audit[1213]: CRED_DISP pid=1213 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:33.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.120:22-10.0.0.1:43722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.671692 kernel: audit: type=1131 audit(1707439953.659:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.120:22-10.0.0.1:43722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.120:22-10.0.0.1:43724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.701000 audit[1243]: USER_ACCT pid=1243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:33.702976 sshd[1243]: Accepted publickey for core from 10.0.0.1 port 43724 ssh2: RSA SHA256:sOEWoh+zUh4IcZRssM/naEKndpgE1eGtzyZR5MeTB1I Feb 9 00:52:33.702000 audit[1243]: CRED_ACQ pid=1243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:33.702000 audit[1243]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedaa6e7d0 a2=3 a3=0 items=0 ppid=1 pid=1243 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:33.702000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 00:52:33.703867 sshd[1243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 00:52:33.707206 systemd-logind[1104]: New session 7 of user core. Feb 9 00:52:33.707806 systemd[1]: Started session-7.scope. Feb 9 00:52:33.713000 audit[1243]: USER_START pid=1243 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:33.714000 audit[1245]: CRED_ACQ pid=1245 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:33.761000 audit[1246]: USER_ACCT pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.761000 audit[1246]: CRED_REFR pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:33.762807 sudo[1246]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 00:52:33.762974 sudo[1246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 00:52:33.763000 audit[1246]: USER_START pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:34.268447 systemd[1]: Reloading. Feb 9 00:52:34.325394 /usr/lib/systemd/system-generators/torcx-generator[1276]: time="2024-02-09T00:52:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 00:52:34.325416 /usr/lib/systemd/system-generators/torcx-generator[1276]: time="2024-02-09T00:52:34Z" level=info msg="torcx already run" Feb 9 00:52:34.380705 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 00:52:34.380720 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 00:52:34.399375 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit: BPF prog-id=34 op=LOAD Feb 9 00:52:34.449000 audit: BPF prog-id=24 op=UNLOAD Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit: BPF prog-id=35 op=LOAD Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.449000 audit: BPF prog-id=36 op=LOAD Feb 9 00:52:34.449000 audit: BPF prog-id=25 op=UNLOAD Feb 9 00:52:34.449000 audit: BPF prog-id=26 op=UNLOAD Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.450000 audit: BPF prog-id=37 op=LOAD Feb 9 00:52:34.450000 audit: BPF prog-id=27 op=UNLOAD Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit: BPF prog-id=38 op=LOAD Feb 9 00:52:34.452000 audit: BPF prog-id=18 op=UNLOAD Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit: BPF prog-id=39 op=LOAD Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.452000 audit: BPF prog-id=40 op=LOAD Feb 9 00:52:34.452000 audit: BPF prog-id=19 op=UNLOAD Feb 9 00:52:34.452000 audit: BPF prog-id=20 op=UNLOAD Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit: BPF prog-id=41 op=LOAD Feb 9 00:52:34.453000 audit: BPF prog-id=29 op=UNLOAD Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit: BPF prog-id=42 op=LOAD Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit: BPF prog-id=43 op=LOAD Feb 9 00:52:34.453000 audit: BPF prog-id=30 op=UNLOAD Feb 9 00:52:34.453000 audit: BPF prog-id=31 op=UNLOAD Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.454000 audit: BPF prog-id=44 op=LOAD Feb 9 00:52:34.454000 audit: BPF prog-id=32 op=UNLOAD Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit: BPF prog-id=45 op=LOAD Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.455000 audit: BPF prog-id=46 op=LOAD Feb 9 00:52:34.455000 audit: BPF prog-id=21 op=UNLOAD Feb 9 00:52:34.455000 audit: BPF prog-id=22 op=UNLOAD Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.456000 audit: BPF prog-id=47 op=LOAD Feb 9 00:52:34.456000 audit: BPF prog-id=28 op=UNLOAD Feb 9 00:52:34.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.457000 audit: BPF prog-id=48 op=LOAD Feb 9 00:52:34.457000 audit: BPF prog-id=23 op=UNLOAD Feb 9 00:52:34.463852 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 00:52:34.468447 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 00:52:34.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:34.468853 systemd[1]: Reached target network-online.target. Feb 9 00:52:34.469931 systemd[1]: Started kubelet.service. Feb 9 00:52:34.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:34.478432 systemd[1]: Starting coreos-metadata.service... Feb 9 00:52:34.483758 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 9 00:52:34.483870 systemd[1]: Finished coreos-metadata.service. Feb 9 00:52:34.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:34.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:34.511387 kubelet[1317]: E0209 00:52:34.511340 1317 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 00:52:34.513363 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 00:52:34.513471 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 00:52:34.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 00:52:34.645570 systemd[1]: Stopped kubelet.service. Feb 9 00:52:34.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:34.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:34.658061 systemd[1]: Reloading. Feb 9 00:52:34.707462 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2024-02-09T00:52:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 00:52:34.709228 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2024-02-09T00:52:34Z" level=info msg="torcx already run" Feb 9 00:52:34.764603 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 00:52:34.764618 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 00:52:34.783510 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit: BPF prog-id=49 op=LOAD Feb 9 00:52:34.833000 audit: BPF prog-id=34 op=UNLOAD Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit: BPF prog-id=50 op=LOAD Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit: BPF prog-id=51 op=LOAD Feb 9 00:52:34.833000 audit: BPF prog-id=35 op=UNLOAD Feb 9 00:52:34.833000 audit: BPF prog-id=36 op=UNLOAD Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.834000 audit: BPF prog-id=52 op=LOAD Feb 9 00:52:34.834000 audit: BPF prog-id=37 op=UNLOAD Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit: BPF prog-id=53 op=LOAD Feb 9 00:52:34.835000 audit: BPF prog-id=38 op=UNLOAD Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.835000 audit: BPF prog-id=54 op=LOAD Feb 9 00:52:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit: BPF prog-id=55 op=LOAD Feb 9 00:52:34.836000 audit: BPF prog-id=39 op=UNLOAD Feb 9 00:52:34.836000 audit: BPF prog-id=40 op=UNLOAD Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit: BPF prog-id=56 op=LOAD Feb 9 00:52:34.837000 audit: BPF prog-id=41 op=UNLOAD Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit: BPF prog-id=57 op=LOAD Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit: BPF prog-id=58 op=LOAD Feb 9 00:52:34.837000 audit: BPF prog-id=42 op=UNLOAD Feb 9 00:52:34.837000 audit: BPF prog-id=43 op=UNLOAD Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.837000 audit: BPF prog-id=59 op=LOAD Feb 9 00:52:34.837000 audit: BPF prog-id=44 op=UNLOAD Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit: BPF prog-id=60 op=LOAD Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.839000 audit: BPF prog-id=61 op=LOAD Feb 9 00:52:34.839000 audit: BPF prog-id=45 op=UNLOAD Feb 9 00:52:34.839000 audit: BPF prog-id=46 op=UNLOAD Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit: BPF prog-id=62 op=LOAD Feb 9 00:52:34.840000 audit: BPF prog-id=47 op=UNLOAD Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:34.841000 audit: BPF prog-id=63 op=LOAD Feb 9 00:52:34.841000 audit: BPF prog-id=48 op=UNLOAD Feb 9 00:52:34.851908 systemd[1]: Started kubelet.service. Feb 9 00:52:34.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:34.889987 kubelet[1427]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 00:52:34.889987 kubelet[1427]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 00:52:34.889987 kubelet[1427]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 00:52:34.890372 kubelet[1427]: I0209 00:52:34.890019 1427 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 00:52:35.094899 kubelet[1427]: I0209 00:52:35.094803 1427 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 00:52:35.094899 kubelet[1427]: I0209 00:52:35.094828 1427 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 00:52:35.095027 kubelet[1427]: I0209 00:52:35.095004 1427 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 00:52:35.097190 kubelet[1427]: I0209 00:52:35.097130 1427 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 00:52:35.104480 kubelet[1427]: I0209 00:52:35.104453 1427 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 00:52:35.104645 kubelet[1427]: I0209 00:52:35.104631 1427 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 00:52:35.104796 kubelet[1427]: I0209 00:52:35.104777 1427 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 00:52:35.104881 kubelet[1427]: I0209 00:52:35.104801 1427 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 00:52:35.104881 kubelet[1427]: I0209 00:52:35.104809 1427 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 00:52:35.104945 kubelet[1427]: I0209 00:52:35.104904 1427 state_mem.go:36] "Initialized new in-memory state store" Feb 9 00:52:35.104983 kubelet[1427]: I0209 00:52:35.104970 1427 kubelet.go:393] "Attempting to sync node with API server" Feb 9 00:52:35.105012 kubelet[1427]: I0209 00:52:35.104986 1427 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 00:52:35.105012 kubelet[1427]: I0209 00:52:35.105007 1427 kubelet.go:309] "Adding apiserver pod source" Feb 9 00:52:35.105067 kubelet[1427]: I0209 00:52:35.105025 1427 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 00:52:35.105234 kubelet[1427]: E0209 00:52:35.105199 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:35.105285 kubelet[1427]: E0209 00:52:35.105245 1427 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:35.105615 kubelet[1427]: I0209 00:52:35.105587 1427 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 00:52:35.105817 kubelet[1427]: W0209 00:52:35.105798 1427 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 00:52:35.106271 kubelet[1427]: I0209 00:52:35.106246 1427 server.go:1232] "Started kubelet" Feb 9 00:52:35.106334 kubelet[1427]: I0209 00:52:35.106299 1427 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 00:52:35.106840 kubelet[1427]: E0209 00:52:35.106799 1427 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 00:52:35.106840 kubelet[1427]: E0209 00:52:35.106833 1427 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 00:52:35.106840 kubelet[1427]: I0209 00:52:35.106835 1427 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 00:52:35.109845 kubelet[1427]: I0209 00:52:35.109629 1427 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 00:52:35.109845 kubelet[1427]: I0209 00:52:35.109802 1427 server.go:462] "Adding debug handlers to kubelet server" Feb 9 00:52:35.108000 audit[1427]: AVC avc: denied { mac_admin } for pid=1427 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:35.108000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:52:35.108000 audit[1427]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e11230 a1=c00011bc98 a2=c000e11200 a3=25 items=0 ppid=1 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.108000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:52:35.109000 audit[1427]: AVC avc: denied { mac_admin } for pid=1427 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:35.109000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:52:35.109000 audit[1427]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000189cc0 a1=c00011bcb0 a2=c000e112c0 a3=25 items=0 ppid=1 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.109000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:52:35.110590 kubelet[1427]: I0209 00:52:35.110125 1427 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 00:52:35.110590 kubelet[1427]: I0209 00:52:35.110174 1427 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 00:52:35.110590 kubelet[1427]: I0209 00:52:35.110256 1427 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 00:52:35.111915 kubelet[1427]: E0209 00:52:35.111799 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97bf6a5b6d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 106225005, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 106225005, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.112370 kubelet[1427]: W0209 00:52:35.112342 1427 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 00:52:35.112422 kubelet[1427]: E0209 00:52:35.112381 1427 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 00:52:35.112646 kubelet[1427]: W0209 00:52:35.112617 1427 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 00:52:35.112646 kubelet[1427]: E0209 00:52:35.112644 1427 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 00:52:35.113133 kubelet[1427]: E0209 00:52:35.112846 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97bf73768a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 106821770, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 106821770, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.113694 kubelet[1427]: E0209 00:52:35.113671 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:35.113694 kubelet[1427]: I0209 00:52:35.113695 1427 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 00:52:35.113795 kubelet[1427]: I0209 00:52:35.113785 1427 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 00:52:35.113834 kubelet[1427]: I0209 00:52:35.113819 1427 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 00:52:35.114637 kubelet[1427]: W0209 00:52:35.114600 1427 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 00:52:35.114637 kubelet[1427]: E0209 00:52:35.114639 1427 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 00:52:35.114989 kubelet[1427]: E0209 00:52:35.114954 1427 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 00:52:35.131000 audit[1440]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:35.131000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3d5d3880 a2=0 a3=7ffd3d5d386c items=0 ppid=1427 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 00:52:35.133418 kubelet[1427]: I0209 00:52:35.133395 1427 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 00:52:35.133497 kubelet[1427]: I0209 00:52:35.133418 1427 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 00:52:35.133497 kubelet[1427]: I0209 00:52:35.133438 1427 state_mem.go:36] "Initialized new in-memory state store" Feb 9 00:52:35.133777 kubelet[1427]: E0209 00:52:35.133693 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fb8d81", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132517761, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132517761, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.133000 audit[1446]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:35.133000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffa7b144e0 a2=0 a3=7fffa7b144cc items=0 ppid=1427 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 00:52:35.134522 kubelet[1427]: E0209 00:52:35.134408 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fbc04a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132530762, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132530762, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.135129 kubelet[1427]: E0209 00:52:35.135056 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fbcf14", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132534548, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132534548, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.136054 kubelet[1427]: I0209 00:52:35.136033 1427 policy_none.go:49] "None policy: Start" Feb 9 00:52:35.136700 kubelet[1427]: I0209 00:52:35.136681 1427 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 00:52:35.136751 kubelet[1427]: I0209 00:52:35.136704 1427 state_mem.go:35] "Initializing new in-memory state store" Feb 9 00:52:35.141124 systemd[1]: Created slice kubepods.slice. Feb 9 00:52:35.144764 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 00:52:35.147188 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 00:52:35.134000 audit[1448]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:35.134000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff99acf550 a2=0 a3=7fff99acf53c items=0 ppid=1427 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 00:52:35.149000 audit[1453]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:35.149000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcfd765f60 a2=0 a3=7ffcfd765f4c items=0 ppid=1427 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 00:52:35.153684 kubelet[1427]: I0209 00:52:35.153665 1427 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 00:52:35.152000 audit[1427]: AVC avc: denied { mac_admin } for pid=1427 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:35.152000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 00:52:35.152000 audit[1427]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c6e7b0 a1=c000bec810 a2=c000c6e750 a3=25 items=0 ppid=1 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.152000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 00:52:35.153854 kubelet[1427]: I0209 00:52:35.153724 1427 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 00:52:35.153881 kubelet[1427]: I0209 00:52:35.153875 1427 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 00:52:35.154926 kubelet[1427]: E0209 00:52:35.154911 1427 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.120\" not found" Feb 9 00:52:35.156332 kubelet[1427]: E0209 00:52:35.156276 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c257d7c2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 155343298, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 155343298, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.178000 audit[1458]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:35.178000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcf1780d70 a2=0 a3=7ffcf1780d5c items=0 ppid=1427 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 00:52:35.179821 kubelet[1427]: I0209 00:52:35.179750 1427 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 00:52:35.179000 audit[1459]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:35.179000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe0ea76000 a2=0 a3=7ffe0ea75fec items=0 ppid=1427 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 00:52:35.179000 audit[1460]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:35.179000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0a92c330 a2=0 a3=7ffc0a92c31c items=0 ppid=1427 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 00:52:35.180785 kubelet[1427]: I0209 00:52:35.180715 1427 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 00:52:35.180785 kubelet[1427]: I0209 00:52:35.180730 1427 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 00:52:35.180875 kubelet[1427]: I0209 00:52:35.180863 1427 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 00:52:35.180957 kubelet[1427]: E0209 00:52:35.180942 1427 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 00:52:35.180000 audit[1461]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:35.180000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc83b659e0 a2=0 a3=7ffc83b659cc items=0 ppid=1427 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.180000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 00:52:35.180000 audit[1462]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:35.180000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffeb9e72b10 a2=0 a3=7ffeb9e72afc items=0 ppid=1427 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 00:52:35.182150 kubelet[1427]: W0209 00:52:35.182105 1427 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 00:52:35.182150 kubelet[1427]: E0209 00:52:35.182126 1427 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 00:52:35.181000 audit[1463]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:35.181000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc9c546ce0 a2=0 a3=7ffc9c546ccc items=0 ppid=1427 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 00:52:35.181000 audit[1464]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:35.181000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb65aed60 a2=0 a3=7ffcb65aed4c items=0 ppid=1427 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 00:52:35.182000 audit[1465]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:35.182000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcea4a9030 a2=0 a3=7ffcea4a901c items=0 ppid=1427 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:35.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 00:52:35.214970 kubelet[1427]: I0209 00:52:35.214952 1427 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 9 00:52:35.215697 kubelet[1427]: E0209 00:52:35.215674 1427 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 9 00:52:35.215907 kubelet[1427]: E0209 00:52:35.215858 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fb8d81", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132517761, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 214911398, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fb8d81" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.216545 kubelet[1427]: E0209 00:52:35.216492 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fbc04a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132530762, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 214921004, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fbc04a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.217235 kubelet[1427]: E0209 00:52:35.217156 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fbcf14", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132534548, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 214924720, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fbcf14" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.316430 kubelet[1427]: E0209 00:52:35.316407 1427 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 00:52:35.417327 kubelet[1427]: I0209 00:52:35.417286 1427 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 9 00:52:35.418245 kubelet[1427]: E0209 00:52:35.418206 1427 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 9 00:52:35.418339 kubelet[1427]: E0209 00:52:35.418272 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fb8d81", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132517761, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 417254924, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fb8d81" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.419012 kubelet[1427]: E0209 00:52:35.418962 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fbc04a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132530762, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 417260683, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fbc04a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.419642 kubelet[1427]: E0209 00:52:35.419552 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fbcf14", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132534548, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 417263168, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fbcf14" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.717823 kubelet[1427]: E0209 00:52:35.717729 1427 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.120\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 00:52:35.819729 kubelet[1427]: I0209 00:52:35.819696 1427 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 9 00:52:35.820790 kubelet[1427]: E0209 00:52:35.820762 1427 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.120" Feb 9 00:52:35.820854 kubelet[1427]: E0209 00:52:35.820774 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fb8d81", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.120 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132517761, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 819647972, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fb8d81" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.821559 kubelet[1427]: E0209 00:52:35.821488 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fbc04a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.120 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132530762, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 819657988, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fbc04a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.822161 kubelet[1427]: E0209 00:52:35.822117 1427 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120.17b20b97c0fbcf14", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.120", UID:"10.0.0.120", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.120 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.120"}, FirstTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 132534548, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 0, 52, 35, 819660512, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.120"}': 'events "10.0.0.120.17b20b97c0fbcf14" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 00:52:35.923562 kubelet[1427]: W0209 00:52:35.923535 1427 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 00:52:35.923562 kubelet[1427]: E0209 00:52:35.923568 1427 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 00:52:35.985069 kubelet[1427]: W0209 00:52:35.984953 1427 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 00:52:35.985069 kubelet[1427]: E0209 00:52:35.984996 1427 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.120" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 00:52:36.085322 kubelet[1427]: W0209 00:52:36.085284 1427 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 00:52:36.085322 kubelet[1427]: E0209 00:52:36.085318 1427 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 00:52:36.097426 kubelet[1427]: I0209 00:52:36.097402 1427 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 00:52:36.105671 kubelet[1427]: E0209 00:52:36.105619 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:36.450539 kubelet[1427]: E0209 00:52:36.450500 1427 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.120" not found Feb 9 00:52:36.520681 kubelet[1427]: E0209 00:52:36.520639 1427 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.120\" not found" node="10.0.0.120" Feb 9 00:52:36.621602 kubelet[1427]: I0209 00:52:36.621566 1427 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.120" Feb 9 00:52:36.641239 kubelet[1427]: I0209 00:52:36.641188 1427 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.120" Feb 9 00:52:36.844313 kubelet[1427]: E0209 00:52:36.844171 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:36.944561 kubelet[1427]: E0209 00:52:36.944495 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:36.969033 sudo[1246]: pam_unix(sudo:session): session closed for user root Feb 9 00:52:36.968000 audit[1246]: USER_END pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:36.968000 audit[1246]: CRED_DISP pid=1246 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 00:52:36.970354 sshd[1243]: pam_unix(sshd:session): session closed for user core Feb 9 00:52:36.970000 audit[1243]: USER_END pid=1243 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:36.970000 audit[1243]: CRED_DISP pid=1243 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 00:52:36.972872 systemd[1]: sshd@6-10.0.0.120:22-10.0.0.1:43724.service: Deactivated successfully. Feb 9 00:52:36.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.120:22-10.0.0.1:43724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 00:52:36.973537 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 00:52:36.974210 systemd-logind[1104]: Session 7 logged out. Waiting for processes to exit. Feb 9 00:52:36.974918 systemd-logind[1104]: Removed session 7. Feb 9 00:52:37.044918 kubelet[1427]: E0209 00:52:37.044868 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:37.106325 kubelet[1427]: E0209 00:52:37.106196 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:37.145778 kubelet[1427]: E0209 00:52:37.145735 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:37.246535 kubelet[1427]: E0209 00:52:37.246492 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:37.347049 kubelet[1427]: E0209 00:52:37.347019 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:37.447584 kubelet[1427]: E0209 00:52:37.447542 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:37.548060 kubelet[1427]: E0209 00:52:37.548026 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:37.648773 kubelet[1427]: E0209 00:52:37.648741 1427 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.120\" not found" Feb 9 00:52:37.749767 kubelet[1427]: I0209 00:52:37.749666 1427 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 00:52:37.749972 env[1119]: time="2024-02-09T00:52:37.749937306Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 00:52:37.750286 kubelet[1427]: I0209 00:52:37.750065 1427 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 00:52:38.106479 kubelet[1427]: I0209 00:52:38.106362 1427 apiserver.go:52] "Watching apiserver" Feb 9 00:52:38.106479 kubelet[1427]: E0209 00:52:38.106375 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:38.108812 kubelet[1427]: I0209 00:52:38.108789 1427 topology_manager.go:215] "Topology Admit Handler" podUID="b3f340a0-0b6a-48f1-baa3-1aef48cf8876" podNamespace="calico-system" podName="calico-node-hspg4" Feb 9 00:52:38.108877 kubelet[1427]: I0209 00:52:38.108864 1427 topology_manager.go:215] "Topology Admit Handler" podUID="caff008f-3171-4225-b413-c8276d238236" podNamespace="calico-system" podName="csi-node-driver-dt2tl" Feb 9 00:52:38.108923 kubelet[1427]: I0209 00:52:38.108915 1427 topology_manager.go:215] "Topology Admit Handler" podUID="9fd42ba5-17db-467b-8406-0a4ba2fdc9af" podNamespace="kube-system" podName="kube-proxy-pfllc" Feb 9 00:52:38.109126 kubelet[1427]: E0209 00:52:38.109105 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:38.114149 systemd[1]: Created slice kubepods-besteffort-pod9fd42ba5_17db_467b_8406_0a4ba2fdc9af.slice. Feb 9 00:52:38.114686 kubelet[1427]: I0209 00:52:38.114165 1427 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 00:52:38.123846 systemd[1]: Created slice kubepods-besteffort-podb3f340a0_0b6a_48f1_baa3_1aef48cf8876.slice. Feb 9 00:52:38.129557 kubelet[1427]: I0209 00:52:38.129497 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-95zl2\" (UniqueName: \"kubernetes.io/projected/caff008f-3171-4225-b413-c8276d238236-kube-api-access-95zl2\") pod \"csi-node-driver-dt2tl\" (UID: \"caff008f-3171-4225-b413-c8276d238236\") " pod="calico-system/csi-node-driver-dt2tl" Feb 9 00:52:38.129664 kubelet[1427]: I0209 00:52:38.129582 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v257m\" (UniqueName: \"kubernetes.io/projected/9fd42ba5-17db-467b-8406-0a4ba2fdc9af-kube-api-access-v257m\") pod \"kube-proxy-pfllc\" (UID: \"9fd42ba5-17db-467b-8406-0a4ba2fdc9af\") " pod="kube-system/kube-proxy-pfllc" Feb 9 00:52:38.129664 kubelet[1427]: I0209 00:52:38.129661 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-var-run-calico\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.129754 kubelet[1427]: I0209 00:52:38.129710 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-cni-net-dir\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.129754 kubelet[1427]: I0209 00:52:38.129737 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-cni-log-dir\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.129754 kubelet[1427]: I0209 00:52:38.129756 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/caff008f-3171-4225-b413-c8276d238236-registration-dir\") pod \"csi-node-driver-dt2tl\" (UID: \"caff008f-3171-4225-b413-c8276d238236\") " pod="calico-system/csi-node-driver-dt2tl" Feb 9 00:52:38.129853 kubelet[1427]: I0209 00:52:38.129782 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-var-lib-calico\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.129853 kubelet[1427]: I0209 00:52:38.129844 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-cni-bin-dir\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.129912 kubelet[1427]: I0209 00:52:38.129875 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/caff008f-3171-4225-b413-c8276d238236-kubelet-dir\") pod \"csi-node-driver-dt2tl\" (UID: \"caff008f-3171-4225-b413-c8276d238236\") " pod="calico-system/csi-node-driver-dt2tl" Feb 9 00:52:38.129912 kubelet[1427]: I0209 00:52:38.129900 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-lib-modules\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.129972 kubelet[1427]: I0209 00:52:38.129924 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-tigera-ca-bundle\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.129972 kubelet[1427]: I0209 00:52:38.129968 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-flexvol-driver-host\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.130038 kubelet[1427]: I0209 00:52:38.129990 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pqnfs\" (UniqueName: \"kubernetes.io/projected/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-kube-api-access-pqnfs\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.130099 kubelet[1427]: I0209 00:52:38.130040 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/caff008f-3171-4225-b413-c8276d238236-varrun\") pod \"csi-node-driver-dt2tl\" (UID: \"caff008f-3171-4225-b413-c8276d238236\") " pod="calico-system/csi-node-driver-dt2tl" Feb 9 00:52:38.130142 kubelet[1427]: I0209 00:52:38.130127 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/caff008f-3171-4225-b413-c8276d238236-socket-dir\") pod \"csi-node-driver-dt2tl\" (UID: \"caff008f-3171-4225-b413-c8276d238236\") " pod="calico-system/csi-node-driver-dt2tl" Feb 9 00:52:38.130175 kubelet[1427]: I0209 00:52:38.130160 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9fd42ba5-17db-467b-8406-0a4ba2fdc9af-kube-proxy\") pod \"kube-proxy-pfllc\" (UID: \"9fd42ba5-17db-467b-8406-0a4ba2fdc9af\") " pod="kube-system/kube-proxy-pfllc" Feb 9 00:52:38.130206 kubelet[1427]: I0209 00:52:38.130190 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9fd42ba5-17db-467b-8406-0a4ba2fdc9af-xtables-lock\") pod \"kube-proxy-pfllc\" (UID: \"9fd42ba5-17db-467b-8406-0a4ba2fdc9af\") " pod="kube-system/kube-proxy-pfllc" Feb 9 00:52:38.130248 kubelet[1427]: I0209 00:52:38.130217 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-xtables-lock\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.130286 kubelet[1427]: I0209 00:52:38.130260 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-policysync\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.130319 kubelet[1427]: I0209 00:52:38.130291 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b3f340a0-0b6a-48f1-baa3-1aef48cf8876-node-certs\") pod \"calico-node-hspg4\" (UID: \"b3f340a0-0b6a-48f1-baa3-1aef48cf8876\") " pod="calico-system/calico-node-hspg4" Feb 9 00:52:38.130319 kubelet[1427]: I0209 00:52:38.130317 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9fd42ba5-17db-467b-8406-0a4ba2fdc9af-lib-modules\") pod \"kube-proxy-pfllc\" (UID: \"9fd42ba5-17db-467b-8406-0a4ba2fdc9af\") " pod="kube-system/kube-proxy-pfllc" Feb 9 00:52:38.232168 kubelet[1427]: E0209 00:52:38.232147 1427 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:52:38.232168 kubelet[1427]: W0209 00:52:38.232161 1427 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:52:38.232168 kubelet[1427]: E0209 00:52:38.232175 1427 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:52:38.233729 kubelet[1427]: E0209 00:52:38.233702 1427 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:52:38.233729 kubelet[1427]: W0209 00:52:38.233724 1427 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:52:38.233729 kubelet[1427]: E0209 00:52:38.233740 1427 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:52:38.242432 kubelet[1427]: E0209 00:52:38.242417 1427 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:52:38.242432 kubelet[1427]: W0209 00:52:38.242427 1427 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:52:38.242525 kubelet[1427]: E0209 00:52:38.242443 1427 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:52:38.242584 kubelet[1427]: E0209 00:52:38.242574 1427 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:52:38.242584 kubelet[1427]: W0209 00:52:38.242582 1427 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:52:38.242665 kubelet[1427]: E0209 00:52:38.242590 1427 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:52:38.244319 kubelet[1427]: E0209 00:52:38.244298 1427 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 00:52:38.244319 kubelet[1427]: W0209 00:52:38.244311 1427 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 00:52:38.244382 kubelet[1427]: E0209 00:52:38.244325 1427 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 00:52:38.422408 kubelet[1427]: E0209 00:52:38.422380 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:38.423253 env[1119]: time="2024-02-09T00:52:38.423187894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pfllc,Uid:9fd42ba5-17db-467b-8406-0a4ba2fdc9af,Namespace:kube-system,Attempt:0,}" Feb 9 00:52:38.425211 kubelet[1427]: E0209 00:52:38.425183 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:38.425626 env[1119]: time="2024-02-09T00:52:38.425591218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hspg4,Uid:b3f340a0-0b6a-48f1-baa3-1aef48cf8876,Namespace:calico-system,Attempt:0,}" Feb 9 00:52:38.982320 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount153923508.mount: Deactivated successfully. Feb 9 00:52:38.986946 env[1119]: time="2024-02-09T00:52:38.986911192Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:38.989254 env[1119]: time="2024-02-09T00:52:38.989217471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:38.990025 env[1119]: time="2024-02-09T00:52:38.989993534Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:38.991538 env[1119]: time="2024-02-09T00:52:38.991510458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:38.992953 env[1119]: time="2024-02-09T00:52:38.992915391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:38.994267 env[1119]: time="2024-02-09T00:52:38.994240929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:38.995893 env[1119]: time="2024-02-09T00:52:38.995866619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:38.998287 env[1119]: time="2024-02-09T00:52:38.998252263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:39.012063 env[1119]: time="2024-02-09T00:52:39.011986726Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:52:39.012063 env[1119]: time="2024-02-09T00:52:39.012031302Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:52:39.012063 env[1119]: time="2024-02-09T00:52:39.012045186Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:52:39.013194 env[1119]: time="2024-02-09T00:52:39.012216921Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/326ee12b244b5138cfd7b246de07fc55f0775a2ef5e6d09eb85790a6d21fa514 pid=1487 runtime=io.containerd.runc.v2 Feb 9 00:52:39.016178 env[1119]: time="2024-02-09T00:52:39.016124018Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:52:39.016260 env[1119]: time="2024-02-09T00:52:39.016187967Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:52:39.016260 env[1119]: time="2024-02-09T00:52:39.016200800Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:52:39.016480 env[1119]: time="2024-02-09T00:52:39.016426326Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec pid=1505 runtime=io.containerd.runc.v2 Feb 9 00:52:39.023779 systemd[1]: Started cri-containerd-326ee12b244b5138cfd7b246de07fc55f0775a2ef5e6d09eb85790a6d21fa514.scope. Feb 9 00:52:39.028858 systemd[1]: Started cri-containerd-43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec.scope. Feb 9 00:52:39.038828 kernel: kauditd_printk_skb: 416 callbacks suppressed Feb 9 00:52:39.038906 kernel: audit: type=1400 audit(1707439959.035:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.042694 kernel: audit: type=1400 audit(1707439959.035:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.042724 kernel: audit: type=1400 audit(1707439959.035:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.042738 kernel: audit: type=1400 audit(1707439959.035:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.046538 kernel: audit: type=1400 audit(1707439959.035:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.046579 kernel: audit: type=1400 audit(1707439959.035:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.048537 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 00:52:39.048565 kernel: audit: type=1400 audit(1707439959.035:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.049218 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 00:52:39.049346 kernel: audit: backlog limit exceeded Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit: BPF prog-id=64 op=LOAD Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1487 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332366565313262323434623531333863666437623234366465303766 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1487 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332366565313262323434623531333863666437623234366465303766 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit: BPF prog-id=65 op=LOAD Feb 9 00:52:39.037000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.037000 audit: BPF prog-id=66 op=LOAD Feb 9 00:52:39.037000 audit[1500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000257570 items=0 ppid=1487 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332366565313262323434623531333863666437623234366465303766 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.041000 audit: BPF prog-id=67 op=LOAD Feb 9 00:52:39.041000 audit[1500]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002575b8 items=0 ppid=1487 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332366565313262323434623531333863666437623234366465303766 Feb 9 00:52:39.043000 audit: BPF prog-id=67 op=UNLOAD Feb 9 00:52:39.043000 audit: BPF prog-id=66 op=UNLOAD Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { perfmon } for pid=1500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit[1500]: AVC avc: denied { bpf } for pid=1500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.043000 audit: BPF prog-id=68 op=LOAD Feb 9 00:52:39.043000 audit[1500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002579c8 items=0 ppid=1487 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332366565313262323434623531333863666437623234366465303766 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1505 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656537376266656362626132376563643566306361613863616338 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit: BPF prog-id=69 op=LOAD Feb 9 00:52:39.051000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002179b0 items=0 ppid=1505 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656537376266656362626132376563643566306361613863616338 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit: BPF prog-id=70 op=LOAD Feb 9 00:52:39.051000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002179f8 items=0 ppid=1505 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656537376266656362626132376563643566306361613863616338 Feb 9 00:52:39.051000 audit: BPF prog-id=70 op=UNLOAD Feb 9 00:52:39.051000 audit: BPF prog-id=69 op=UNLOAD Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:39.051000 audit: BPF prog-id=71 op=LOAD Feb 9 00:52:39.051000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000217e08 items=0 ppid=1505 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:39.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656537376266656362626132376563643566306361613863616338 Feb 9 00:52:39.063827 env[1119]: time="2024-02-09T00:52:39.063783016Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hspg4,Uid:b3f340a0-0b6a-48f1-baa3-1aef48cf8876,Namespace:calico-system,Attempt:0,} returns sandbox id \"43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec\"" Feb 9 00:52:39.064558 env[1119]: time="2024-02-09T00:52:39.064529235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pfllc,Uid:9fd42ba5-17db-467b-8406-0a4ba2fdc9af,Namespace:kube-system,Attempt:0,} returns sandbox id \"326ee12b244b5138cfd7b246de07fc55f0775a2ef5e6d09eb85790a6d21fa514\"" Feb 9 00:52:39.064678 kubelet[1427]: E0209 00:52:39.064661 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:39.065676 kubelet[1427]: E0209 00:52:39.065651 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:39.065781 env[1119]: time="2024-02-09T00:52:39.065760306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 00:52:39.106679 kubelet[1427]: E0209 00:52:39.106646 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:40.107635 kubelet[1427]: E0209 00:52:40.107586 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:40.181916 kubelet[1427]: E0209 00:52:40.181857 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:40.935992 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1380018023.mount: Deactivated successfully. Feb 9 00:52:41.108204 kubelet[1427]: E0209 00:52:41.108159 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:42.109197 kubelet[1427]: E0209 00:52:42.109153 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:42.182012 kubelet[1427]: E0209 00:52:42.181962 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:42.570400 env[1119]: time="2024-02-09T00:52:42.570352301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:42.571826 env[1119]: time="2024-02-09T00:52:42.571791338Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:42.573557 env[1119]: time="2024-02-09T00:52:42.573520742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:42.575920 env[1119]: time="2024-02-09T00:52:42.575888798Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:42.576710 env[1119]: time="2024-02-09T00:52:42.576677112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 00:52:42.577377 env[1119]: time="2024-02-09T00:52:42.577247526Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 00:52:42.578486 env[1119]: time="2024-02-09T00:52:42.578442678Z" level=info msg="CreateContainer within sandbox \"43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 00:52:42.589108 env[1119]: time="2024-02-09T00:52:42.589062474Z" level=info msg="CreateContainer within sandbox \"43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"aaeeade97c9d75985efb5e0896e174a9e69c9f074c1df2f1bc9f9c47bc7c8f05\"" Feb 9 00:52:42.589619 env[1119]: time="2024-02-09T00:52:42.589592276Z" level=info msg="StartContainer for \"aaeeade97c9d75985efb5e0896e174a9e69c9f074c1df2f1bc9f9c47bc7c8f05\"" Feb 9 00:52:42.604325 systemd[1]: Started cri-containerd-aaeeade97c9d75985efb5e0896e174a9e69c9f074c1df2f1bc9f9c47bc7c8f05.scope. Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1505 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:42.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656561646539376339643735393835656662356530383936653137 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit: BPF prog-id=72 op=LOAD Feb 9 00:52:42.616000 audit[1570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e2440 items=0 ppid=1505 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:42.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656561646539376339643735393835656662356530383936653137 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit: BPF prog-id=73 op=LOAD Feb 9 00:52:42.616000 audit[1570]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e2488 items=0 ppid=1505 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:42.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656561646539376339643735393835656662356530383936653137 Feb 9 00:52:42.616000 audit: BPF prog-id=73 op=UNLOAD Feb 9 00:52:42.616000 audit: BPF prog-id=72 op=UNLOAD Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { perfmon } for pid=1570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit[1570]: AVC avc: denied { bpf } for pid=1570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:42.616000 audit: BPF prog-id=74 op=LOAD Feb 9 00:52:42.616000 audit[1570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e2518 items=0 ppid=1505 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:42.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161656561646539376339643735393835656662356530383936653137 Feb 9 00:52:42.633218 env[1119]: time="2024-02-09T00:52:42.633172095Z" level=info msg="StartContainer for \"aaeeade97c9d75985efb5e0896e174a9e69c9f074c1df2f1bc9f9c47bc7c8f05\" returns successfully" Feb 9 00:52:42.636477 systemd[1]: cri-containerd-aaeeade97c9d75985efb5e0896e174a9e69c9f074c1df2f1bc9f9c47bc7c8f05.scope: Deactivated successfully. Feb 9 00:52:42.641000 audit: BPF prog-id=74 op=UNLOAD Feb 9 00:52:42.742260 env[1119]: time="2024-02-09T00:52:42.742214824Z" level=info msg="shim disconnected" id=aaeeade97c9d75985efb5e0896e174a9e69c9f074c1df2f1bc9f9c47bc7c8f05 Feb 9 00:52:42.742260 env[1119]: time="2024-02-09T00:52:42.742254072Z" level=warning msg="cleaning up after shim disconnected" id=aaeeade97c9d75985efb5e0896e174a9e69c9f074c1df2f1bc9f9c47bc7c8f05 namespace=k8s.io Feb 9 00:52:42.742260 env[1119]: time="2024-02-09T00:52:42.742262667Z" level=info msg="cleaning up dead shim" Feb 9 00:52:42.748415 env[1119]: time="2024-02-09T00:52:42.748393170Z" level=warning msg="cleanup warnings time=\"2024-02-09T00:52:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1609 runtime=io.containerd.runc.v2\n" Feb 9 00:52:43.109324 kubelet[1427]: E0209 00:52:43.109289 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:43.195005 kubelet[1427]: E0209 00:52:43.194983 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:43.585803 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aaeeade97c9d75985efb5e0896e174a9e69c9f074c1df2f1bc9f9c47bc7c8f05-rootfs.mount: Deactivated successfully. Feb 9 00:52:44.110127 kubelet[1427]: E0209 00:52:44.110098 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:44.121365 env[1119]: time="2024-02-09T00:52:44.121327787Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:44.127790 env[1119]: time="2024-02-09T00:52:44.127745903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:44.129426 env[1119]: time="2024-02-09T00:52:44.129388081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:44.130742 env[1119]: time="2024-02-09T00:52:44.130708774Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:44.131096 env[1119]: time="2024-02-09T00:52:44.131061724Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 9 00:52:44.131801 env[1119]: time="2024-02-09T00:52:44.131768297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 00:52:44.132709 env[1119]: time="2024-02-09T00:52:44.132670083Z" level=info msg="CreateContainer within sandbox \"326ee12b244b5138cfd7b246de07fc55f0775a2ef5e6d09eb85790a6d21fa514\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 00:52:44.145017 env[1119]: time="2024-02-09T00:52:44.144977326Z" level=info msg="CreateContainer within sandbox \"326ee12b244b5138cfd7b246de07fc55f0775a2ef5e6d09eb85790a6d21fa514\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8a3896784a224a75ee157def18243a040f30e1c54f7ebc2dccc907ff4d8b3359\"" Feb 9 00:52:44.145456 env[1119]: time="2024-02-09T00:52:44.145418231Z" level=info msg="StartContainer for \"8a3896784a224a75ee157def18243a040f30e1c54f7ebc2dccc907ff4d8b3359\"" Feb 9 00:52:44.159957 systemd[1]: Started cri-containerd-8a3896784a224a75ee157def18243a040f30e1c54f7ebc2dccc907ff4d8b3359.scope. Feb 9 00:52:44.173101 kernel: kauditd_printk_skb: 148 callbacks suppressed Feb 9 00:52:44.173196 kernel: audit: type=1400 audit(1707439964.170:595): avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1487 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.176348 kernel: audit: type=1300 audit(1707439964.170:595): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1487 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.176383 kernel: audit: type=1327 audit(1707439964.170:595): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333839363738346132323461373565653135376465663138323433 Feb 9 00:52:44.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333839363738346132323461373565653135376465663138323433 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.181010 kernel: audit: type=1400 audit(1707439964.170:596): avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.181049 kernel: audit: type=1400 audit(1707439964.170:596): avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.181315 kubelet[1427]: E0209 00:52:44.181291 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.185711 kernel: audit: type=1400 audit(1707439964.170:596): avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.188520 kernel: audit: type=1400 audit(1707439964.170:596): avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.188567 kernel: audit: type=1400 audit(1707439964.170:596): avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.190743 kernel: audit: type=1400 audit(1707439964.170:596): avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.195521 kernel: audit: type=1400 audit(1707439964.170:596): avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.170000 audit: BPF prog-id=75 op=LOAD Feb 9 00:52:44.170000 audit[1633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a80f0 items=0 ppid=1487 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333839363738346132323461373565653135376465663138323433 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.173000 audit: BPF prog-id=76 op=LOAD Feb 9 00:52:44.173000 audit[1633]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a8138 items=0 ppid=1487 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333839363738346132323461373565653135376465663138323433 Feb 9 00:52:44.178000 audit: BPF prog-id=76 op=UNLOAD Feb 9 00:52:44.179000 audit: BPF prog-id=75 op=UNLOAD Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { perfmon } for pid=1633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit[1633]: AVC avc: denied { bpf } for pid=1633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:44.179000 audit: BPF prog-id=77 op=LOAD Feb 9 00:52:44.179000 audit[1633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a81c8 items=0 ppid=1487 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861333839363738346132323461373565653135376465663138323433 Feb 9 00:52:44.201095 env[1119]: time="2024-02-09T00:52:44.199651454Z" level=info msg="StartContainer for \"8a3896784a224a75ee157def18243a040f30e1c54f7ebc2dccc907ff4d8b3359\" returns successfully" Feb 9 00:52:44.243000 audit[1683]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.243000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe10978ed0 a2=0 a3=7ffe10978ebc items=0 ppid=1643 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 00:52:44.243000 audit[1684]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.243000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff14bf38f0 a2=0 a3=7fff14bf38dc items=0 ppid=1643 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 00:52:44.245000 audit[1685]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.245000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc76fbd660 a2=0 a3=7ffc76fbd64c items=0 ppid=1643 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 00:52:44.245000 audit[1686]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.245000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6aa98dc0 a2=0 a3=7ffd6aa98dac items=0 ppid=1643 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 00:52:44.247000 audit[1687]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.247000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcae964800 a2=0 a3=7ffcae9647ec items=0 ppid=1643 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 00:52:44.247000 audit[1689]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.247000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcdecc620 a2=0 a3=7ffdcdecc60c items=0 ppid=1643 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 00:52:44.345000 audit[1690]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.345000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff54bc93d0 a2=0 a3=7fff54bc93bc items=0 ppid=1643 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 00:52:44.347000 audit[1692]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.347000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff5b5f91f0 a2=0 a3=7fff5b5f91dc items=0 ppid=1643 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 00:52:44.350000 audit[1695]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.350000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc2d1ad4e0 a2=0 a3=7ffc2d1ad4cc items=0 ppid=1643 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 00:52:44.351000 audit[1696]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.351000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec10875c0 a2=0 a3=7ffec10875ac items=0 ppid=1643 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 00:52:44.353000 audit[1698]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.353000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfbde6290 a2=0 a3=7ffcfbde627c items=0 ppid=1643 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 00:52:44.354000 audit[1699]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.354000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffafed80f0 a2=0 a3=7fffafed80dc items=0 ppid=1643 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 00:52:44.356000 audit[1701]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.356000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea55368c0 a2=0 a3=7ffea55368ac items=0 ppid=1643 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 00:52:44.358000 audit[1704]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.358000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe4ecd2160 a2=0 a3=7ffe4ecd214c items=0 ppid=1643 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 00:52:44.359000 audit[1705]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.359000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5e9de130 a2=0 a3=7ffc5e9de11c items=0 ppid=1643 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 00:52:44.361000 audit[1707]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.361000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcae860b90 a2=0 a3=7ffcae860b7c items=0 ppid=1643 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 00:52:44.362000 audit[1708]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.362000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff48c34bc0 a2=0 a3=7fff48c34bac items=0 ppid=1643 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 00:52:44.364000 audit[1710]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.364000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7bb74f40 a2=0 a3=7ffd7bb74f2c items=0 ppid=1643 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 00:52:44.366000 audit[1713]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.366000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0f6e4980 a2=0 a3=7ffc0f6e496c items=0 ppid=1643 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 00:52:44.369000 audit[1716]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.369000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff87d9b7f0 a2=0 a3=7fff87d9b7dc items=0 ppid=1643 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 00:52:44.370000 audit[1717]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.370000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffedb7b440 a2=0 a3=7fffedb7b42c items=0 ppid=1643 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 00:52:44.372000 audit[1719]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.372000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffe92d8550 a2=0 a3=7fffe92d853c items=0 ppid=1643 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 00:52:44.391000 audit[1725]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.391000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcbd1ad3d0 a2=0 a3=7ffcbd1ad3bc items=0 ppid=1643 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 00:52:44.392000 audit[1726]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.392000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb0c16f00 a2=0 a3=7ffdb0c16eec items=0 ppid=1643 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 00:52:44.393000 audit[1728]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 00:52:44.393000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe156122f0 a2=0 a3=7ffe156122dc items=0 ppid=1643 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.393000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 00:52:44.404000 audit[1734]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:52:44.404000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd73b18450 a2=0 a3=7ffd73b1843c items=0 ppid=1643 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:52:44.413000 audit[1734]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:52:44.413000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd73b18450 a2=0 a3=7ffd73b1843c items=0 ppid=1643 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:52:44.414000 audit[1740]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.414000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc51630ca0 a2=0 a3=7ffc51630c8c items=0 ppid=1643 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 00:52:44.416000 audit[1742]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.416000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdabc0a140 a2=0 a3=7ffdabc0a12c items=0 ppid=1643 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 00:52:44.418000 audit[1745]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.418000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6afd1980 a2=0 a3=7fff6afd196c items=0 ppid=1643 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 00:52:44.419000 audit[1746]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.419000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9ab41190 a2=0 a3=7ffc9ab4117c items=0 ppid=1643 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 00:52:44.421000 audit[1748]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.421000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2954c8c0 a2=0 a3=7fff2954c8ac items=0 ppid=1643 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 00:52:44.422000 audit[1749]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.422000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd5f767d0 a2=0 a3=7ffdd5f767bc items=0 ppid=1643 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 00:52:44.424000 audit[1751]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.424000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc2e948ae0 a2=0 a3=7ffc2e948acc items=0 ppid=1643 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 00:52:44.426000 audit[1754]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.426000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe27b84f30 a2=0 a3=7ffe27b84f1c items=0 ppid=1643 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 00:52:44.427000 audit[1755]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.427000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd26278ac0 a2=0 a3=7ffd26278aac items=0 ppid=1643 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 00:52:44.429000 audit[1757]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.429000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1b8d3c50 a2=0 a3=7ffe1b8d3c3c items=0 ppid=1643 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 00:52:44.430000 audit[1758]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.430000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde78e0d00 a2=0 a3=7ffde78e0cec items=0 ppid=1643 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 00:52:44.432000 audit[1760]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.432000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd80489730 a2=0 a3=7ffd8048971c items=0 ppid=1643 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 00:52:44.434000 audit[1763]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.434000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc19fb160 a2=0 a3=7ffdc19fb14c items=0 ppid=1643 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 00:52:44.437000 audit[1766]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.437000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffce76ffe0 a2=0 a3=7fffce76ffcc items=0 ppid=1643 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 00:52:44.438000 audit[1767]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.438000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdab7999e0 a2=0 a3=7ffdab7999cc items=0 ppid=1643 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 00:52:44.440000 audit[1769]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.440000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffa9635c60 a2=0 a3=7fffa9635c4c items=0 ppid=1643 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 00:52:44.442000 audit[1772]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.442000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff67b54910 a2=0 a3=7fff67b548fc items=0 ppid=1643 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 00:52:44.443000 audit[1773]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.443000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8f7f7330 a2=0 a3=7fff8f7f731c items=0 ppid=1643 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 00:52:44.444000 audit[1775]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.444000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd806fa560 a2=0 a3=7ffd806fa54c items=0 ppid=1643 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 00:52:44.445000 audit[1776]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.445000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd39b9dbe0 a2=0 a3=7ffd39b9dbcc items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 00:52:44.447000 audit[1778]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.447000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff90000b80 a2=0 a3=7fff90000b6c items=0 ppid=1643 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 00:52:44.449000 audit[1781]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 00:52:44.449000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff598069b0 a2=0 a3=7fff5980699c items=0 ppid=1643 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 00:52:44.451000 audit[1783]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 00:52:44.451000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe19292b60 a2=0 a3=7ffe19292b4c items=0 ppid=1643 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.451000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:52:44.452000 audit[1783]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 00:52:44.452000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe19292b60 a2=0 a3=7ffe19292b4c items=0 ppid=1643 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:44.452000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:52:45.110312 kubelet[1427]: E0209 00:52:45.110290 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:45.198834 kubelet[1427]: E0209 00:52:45.198810 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:45.204674 kubelet[1427]: I0209 00:52:45.204652 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-pfllc" podStartSLOduration=4.139213588 podCreationTimestamp="2024-02-09 00:52:36 +0000 UTC" firstStartedPulling="2024-02-09 00:52:39.065953406 +0000 UTC m=+4.211079637" lastFinishedPulling="2024-02-09 00:52:44.131364167 +0000 UTC m=+9.276490398" observedRunningTime="2024-02-09 00:52:45.204574441 +0000 UTC m=+10.349700672" watchObservedRunningTime="2024-02-09 00:52:45.204624349 +0000 UTC m=+10.349750580" Feb 9 00:52:45.338000 audit[1785]: NETFILTER_CFG table=filter:65 family=2 entries=15 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:52:45.338000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc9ba43d40 a2=0 a3=7ffc9ba43d2c items=0 ppid=1643 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:45.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:52:45.339000 audit[1785]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:52:45.339000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc9ba43d40 a2=0 a3=7ffc9ba43d2c items=0 ppid=1643 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:45.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:52:45.987997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2919509593.mount: Deactivated successfully. Feb 9 00:52:46.110528 kubelet[1427]: E0209 00:52:46.110433 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:46.181410 kubelet[1427]: E0209 00:52:46.181356 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:46.200209 kubelet[1427]: E0209 00:52:46.200165 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:47.110806 kubelet[1427]: E0209 00:52:47.110733 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:48.111521 kubelet[1427]: E0209 00:52:48.111489 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:48.181148 kubelet[1427]: E0209 00:52:48.181125 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:49.112089 kubelet[1427]: E0209 00:52:49.112049 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:50.112235 kubelet[1427]: E0209 00:52:50.112183 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:50.182106 kubelet[1427]: E0209 00:52:50.182055 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:50.936225 env[1119]: time="2024-02-09T00:52:50.936160859Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:50.937822 env[1119]: time="2024-02-09T00:52:50.937790065Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:50.939373 env[1119]: time="2024-02-09T00:52:50.939352581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:50.941020 env[1119]: time="2024-02-09T00:52:50.940996473Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:52:50.941727 env[1119]: time="2024-02-09T00:52:50.941695870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 00:52:50.943314 env[1119]: time="2024-02-09T00:52:50.943261712Z" level=info msg="CreateContainer within sandbox \"43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 00:52:50.955189 env[1119]: time="2024-02-09T00:52:50.955156725Z" level=info msg="CreateContainer within sandbox \"43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"b4306dbf93ccd596195c2dc50a38eea9eaafe7dad0f095a9e3a4beb190d9a6a3\"" Feb 9 00:52:50.955582 env[1119]: time="2024-02-09T00:52:50.955557955Z" level=info msg="StartContainer for \"b4306dbf93ccd596195c2dc50a38eea9eaafe7dad0f095a9e3a4beb190d9a6a3\"" Feb 9 00:52:50.972175 systemd[1]: Started cri-containerd-b4306dbf93ccd596195c2dc50a38eea9eaafe7dad0f095a9e3a4beb190d9a6a3.scope. Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.987691 kernel: kauditd_printk_skb: 192 callbacks suppressed Feb 9 00:52:50.987750 kernel: audit: type=1400 audit(1707439970.983:654): avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.987790 kernel: audit: type=1300 audit(1707439970.983:654): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1505 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:50.983000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1505 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:50.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234333036646266393363636435393631393563326463353061333865 Feb 9 00:52:50.995469 kernel: audit: type=1327 audit(1707439970.983:654): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234333036646266393363636435393631393563326463353061333865 Feb 9 00:52:50.995517 kernel: audit: type=1400 audit(1707439970.983:655): avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:51.000912 kernel: audit: type=1400 audit(1707439970.983:655): avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:51.007018 kernel: audit: type=1400 audit(1707439970.983:655): avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:51.007152 kernel: audit: type=1400 audit(1707439970.983:655): avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:51.007186 kernel: audit: type=1400 audit(1707439970.983:655): avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:51.012469 kernel: audit: type=1400 audit(1707439970.983:655): avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:51.012520 kernel: audit: type=1400 audit(1707439970.983:655): avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.983000 audit: BPF prog-id=78 op=LOAD Feb 9 00:52:50.983000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003e0280 items=0 ppid=1505 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:50.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234333036646266393363636435393631393563326463353061333865 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.986000 audit: BPF prog-id=79 op=LOAD Feb 9 00:52:50.986000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003e02c8 items=0 ppid=1505 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:50.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234333036646266393363636435393631393563326463353061333865 Feb 9 00:52:50.990000 audit: BPF prog-id=79 op=UNLOAD Feb 9 00:52:50.990000 audit: BPF prog-id=78 op=UNLOAD Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:52:50.990000 audit: BPF prog-id=80 op=LOAD Feb 9 00:52:50.990000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003e0358 items=0 ppid=1505 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:52:50.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234333036646266393363636435393631393563326463353061333865 Feb 9 00:52:51.113257 kubelet[1427]: E0209 00:52:51.113209 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:51.222338 env[1119]: time="2024-02-09T00:52:51.221648802Z" level=info msg="StartContainer for \"b4306dbf93ccd596195c2dc50a38eea9eaafe7dad0f095a9e3a4beb190d9a6a3\" returns successfully" Feb 9 00:52:52.113728 kubelet[1427]: E0209 00:52:52.113699 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:52.182088 kubelet[1427]: E0209 00:52:52.182032 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:52.225030 kubelet[1427]: E0209 00:52:52.225005 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:52.290746 env[1119]: time="2024-02-09T00:52:52.290681677Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 00:52:52.294583 systemd[1]: cri-containerd-b4306dbf93ccd596195c2dc50a38eea9eaafe7dad0f095a9e3a4beb190d9a6a3.scope: Deactivated successfully. Feb 9 00:52:52.298000 audit: BPF prog-id=80 op=UNLOAD Feb 9 00:52:52.311437 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b4306dbf93ccd596195c2dc50a38eea9eaafe7dad0f095a9e3a4beb190d9a6a3-rootfs.mount: Deactivated successfully. Feb 9 00:52:52.359401 kubelet[1427]: I0209 00:52:52.359365 1427 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 00:52:52.458062 kubelet[1427]: I0209 00:52:52.457938 1427 topology_manager.go:215] "Topology Admit Handler" podUID="b1ab66ca-725b-4df3-a0f1-e106971a48e5" podNamespace="kube-system" podName="coredns-5dd5756b68-7r5tn" Feb 9 00:52:52.462236 systemd[1]: Created slice kubepods-burstable-podb1ab66ca_725b_4df3_a0f1_e106971a48e5.slice. Feb 9 00:52:52.490861 kubelet[1427]: I0209 00:52:52.490800 1427 topology_manager.go:215] "Topology Admit Handler" podUID="7d87966c-cf98-4792-a947-3dded052fd55" podNamespace="kube-system" podName="coredns-5dd5756b68-mqf6q" Feb 9 00:52:52.491035 kubelet[1427]: I0209 00:52:52.490952 1427 topology_manager.go:215] "Topology Admit Handler" podUID="11558908-1e80-422d-9511-06bbda4b3f1e" podNamespace="calico-system" podName="calico-kube-controllers-5f44497d7d-9tsq8" Feb 9 00:52:52.495372 systemd[1]: Created slice kubepods-besteffort-pod11558908_1e80_422d_9511_06bbda4b3f1e.slice. Feb 9 00:52:52.499022 systemd[1]: Created slice kubepods-burstable-pod7d87966c_cf98_4792_a947_3dded052fd55.slice. Feb 9 00:52:52.507659 kubelet[1427]: I0209 00:52:52.507629 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-94hcq\" (UniqueName: \"kubernetes.io/projected/7d87966c-cf98-4792-a947-3dded052fd55-kube-api-access-94hcq\") pod \"coredns-5dd5756b68-mqf6q\" (UID: \"7d87966c-cf98-4792-a947-3dded052fd55\") " pod="kube-system/coredns-5dd5756b68-mqf6q" Feb 9 00:52:52.507760 kubelet[1427]: I0209 00:52:52.507668 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/11558908-1e80-422d-9511-06bbda4b3f1e-tigera-ca-bundle\") pod \"calico-kube-controllers-5f44497d7d-9tsq8\" (UID: \"11558908-1e80-422d-9511-06bbda4b3f1e\") " pod="calico-system/calico-kube-controllers-5f44497d7d-9tsq8" Feb 9 00:52:52.507760 kubelet[1427]: I0209 00:52:52.507691 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-68649\" (UniqueName: \"kubernetes.io/projected/b1ab66ca-725b-4df3-a0f1-e106971a48e5-kube-api-access-68649\") pod \"coredns-5dd5756b68-7r5tn\" (UID: \"b1ab66ca-725b-4df3-a0f1-e106971a48e5\") " pod="kube-system/coredns-5dd5756b68-7r5tn" Feb 9 00:52:52.507760 kubelet[1427]: I0209 00:52:52.507712 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7d87966c-cf98-4792-a947-3dded052fd55-config-volume\") pod \"coredns-5dd5756b68-mqf6q\" (UID: \"7d87966c-cf98-4792-a947-3dded052fd55\") " pod="kube-system/coredns-5dd5756b68-mqf6q" Feb 9 00:52:52.507841 kubelet[1427]: I0209 00:52:52.507763 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8ccmm\" (UniqueName: \"kubernetes.io/projected/11558908-1e80-422d-9511-06bbda4b3f1e-kube-api-access-8ccmm\") pod \"calico-kube-controllers-5f44497d7d-9tsq8\" (UID: \"11558908-1e80-422d-9511-06bbda4b3f1e\") " pod="calico-system/calico-kube-controllers-5f44497d7d-9tsq8" Feb 9 00:52:52.507841 kubelet[1427]: I0209 00:52:52.507801 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b1ab66ca-725b-4df3-a0f1-e106971a48e5-config-volume\") pod \"coredns-5dd5756b68-7r5tn\" (UID: \"b1ab66ca-725b-4df3-a0f1-e106971a48e5\") " pod="kube-system/coredns-5dd5756b68-7r5tn" Feb 9 00:52:52.773186 kubelet[1427]: E0209 00:52:52.773096 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:52.773726 env[1119]: time="2024-02-09T00:52:52.773673904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7r5tn,Uid:b1ab66ca-725b-4df3-a0f1-e106971a48e5,Namespace:kube-system,Attempt:0,}" Feb 9 00:52:52.797471 env[1119]: time="2024-02-09T00:52:52.797435135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f44497d7d-9tsq8,Uid:11558908-1e80-422d-9511-06bbda4b3f1e,Namespace:calico-system,Attempt:0,}" Feb 9 00:52:52.800593 kubelet[1427]: E0209 00:52:52.800573 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:52.800865 env[1119]: time="2024-02-09T00:52:52.800832088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mqf6q,Uid:7d87966c-cf98-4792-a947-3dded052fd55,Namespace:kube-system,Attempt:0,}" Feb 9 00:52:53.075660 env[1119]: time="2024-02-09T00:52:53.075542536Z" level=info msg="shim disconnected" id=b4306dbf93ccd596195c2dc50a38eea9eaafe7dad0f095a9e3a4beb190d9a6a3 Feb 9 00:52:53.075660 env[1119]: time="2024-02-09T00:52:53.075587488Z" level=warning msg="cleaning up after shim disconnected" id=b4306dbf93ccd596195c2dc50a38eea9eaafe7dad0f095a9e3a4beb190d9a6a3 namespace=k8s.io Feb 9 00:52:53.075660 env[1119]: time="2024-02-09T00:52:53.075597927Z" level=info msg="cleaning up dead shim" Feb 9 00:52:53.081699 env[1119]: time="2024-02-09T00:52:53.081658395Z" level=warning msg="cleanup warnings time=\"2024-02-09T00:52:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1846 runtime=io.containerd.runc.v2\n" Feb 9 00:52:53.114663 kubelet[1427]: E0209 00:52:53.114619 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:53.160873 env[1119]: time="2024-02-09T00:52:53.160789635Z" level=error msg="Failed to destroy network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.161148 env[1119]: time="2024-02-09T00:52:53.161123188Z" level=error msg="encountered an error cleaning up failed sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.161209 env[1119]: time="2024-02-09T00:52:53.161163120Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f44497d7d-9tsq8,Uid:11558908-1e80-422d-9511-06bbda4b3f1e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.161755 kubelet[1427]: E0209 00:52:53.161409 1427 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.161755 kubelet[1427]: E0209 00:52:53.161477 1427 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f44497d7d-9tsq8" Feb 9 00:52:53.161755 kubelet[1427]: E0209 00:52:53.161496 1427 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f44497d7d-9tsq8" Feb 9 00:52:53.161873 kubelet[1427]: E0209 00:52:53.161547 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5f44497d7d-9tsq8_calico-system(11558908-1e80-422d-9511-06bbda4b3f1e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5f44497d7d-9tsq8_calico-system(11558908-1e80-422d-9511-06bbda4b3f1e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f44497d7d-9tsq8" podUID="11558908-1e80-422d-9511-06bbda4b3f1e" Feb 9 00:52:53.163346 env[1119]: time="2024-02-09T00:52:53.163284250Z" level=error msg="Failed to destroy network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.163632 env[1119]: time="2024-02-09T00:52:53.163607074Z" level=error msg="encountered an error cleaning up failed sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.163686 env[1119]: time="2024-02-09T00:52:53.163651875Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7r5tn,Uid:b1ab66ca-725b-4df3-a0f1-e106971a48e5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.163827 kubelet[1427]: E0209 00:52:53.163799 1427 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.163827 kubelet[1427]: E0209 00:52:53.163828 1427 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-7r5tn" Feb 9 00:52:53.163919 kubelet[1427]: E0209 00:52:53.163843 1427 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-7r5tn" Feb 9 00:52:53.163919 kubelet[1427]: E0209 00:52:53.163878 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-7r5tn_kube-system(b1ab66ca-725b-4df3-a0f1-e106971a48e5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-7r5tn_kube-system(b1ab66ca-725b-4df3-a0f1-e106971a48e5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-7r5tn" podUID="b1ab66ca-725b-4df3-a0f1-e106971a48e5" Feb 9 00:52:53.165501 env[1119]: time="2024-02-09T00:52:53.165458144Z" level=error msg="Failed to destroy network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.165742 env[1119]: time="2024-02-09T00:52:53.165707335Z" level=error msg="encountered an error cleaning up failed sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.165794 env[1119]: time="2024-02-09T00:52:53.165746766Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mqf6q,Uid:7d87966c-cf98-4792-a947-3dded052fd55,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.165941 kubelet[1427]: E0209 00:52:53.165927 1427 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.166002 kubelet[1427]: E0209 00:52:53.165953 1427 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-mqf6q" Feb 9 00:52:53.166002 kubelet[1427]: E0209 00:52:53.165972 1427 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-mqf6q" Feb 9 00:52:53.166055 kubelet[1427]: E0209 00:52:53.166004 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-mqf6q_kube-system(7d87966c-cf98-4792-a947-3dded052fd55)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-mqf6q_kube-system(7d87966c-cf98-4792-a947-3dded052fd55)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-mqf6q" podUID="7d87966c-cf98-4792-a947-3dded052fd55" Feb 9 00:52:53.227181 kubelet[1427]: I0209 00:52:53.227148 1427 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:52:53.227662 env[1119]: time="2024-02-09T00:52:53.227631169Z" level=info msg="StopPodSandbox for \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\"" Feb 9 00:52:53.228000 kubelet[1427]: I0209 00:52:53.227974 1427 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:52:53.228354 env[1119]: time="2024-02-09T00:52:53.228324003Z" level=info msg="StopPodSandbox for \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\"" Feb 9 00:52:53.229354 kubelet[1427]: I0209 00:52:53.229326 1427 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:52:53.229722 env[1119]: time="2024-02-09T00:52:53.229696026Z" level=info msg="StopPodSandbox for \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\"" Feb 9 00:52:53.231715 kubelet[1427]: E0209 00:52:53.231590 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:52:53.232379 env[1119]: time="2024-02-09T00:52:53.232329282Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 00:52:53.251202 env[1119]: time="2024-02-09T00:52:53.251144244Z" level=error msg="StopPodSandbox for \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\" failed" error="failed to destroy network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.251459 env[1119]: time="2024-02-09T00:52:53.251431595Z" level=error msg="StopPodSandbox for \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\" failed" error="failed to destroy network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.251511 kubelet[1427]: E0209 00:52:53.251435 1427 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:52:53.251511 kubelet[1427]: E0209 00:52:53.251507 1427 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57"} Feb 9 00:52:53.251611 kubelet[1427]: E0209 00:52:53.251540 1427 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"11558908-1e80-422d-9511-06bbda4b3f1e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:52:53.251611 kubelet[1427]: E0209 00:52:53.251568 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"11558908-1e80-422d-9511-06bbda4b3f1e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f44497d7d-9tsq8" podUID="11558908-1e80-422d-9511-06bbda4b3f1e" Feb 9 00:52:53.251757 kubelet[1427]: E0209 00:52:53.251697 1427 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:52:53.251757 kubelet[1427]: E0209 00:52:53.251712 1427 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f"} Feb 9 00:52:53.251757 kubelet[1427]: E0209 00:52:53.251742 1427 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7d87966c-cf98-4792-a947-3dded052fd55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:52:53.251895 kubelet[1427]: E0209 00:52:53.251762 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7d87966c-cf98-4792-a947-3dded052fd55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-mqf6q" podUID="7d87966c-cf98-4792-a947-3dded052fd55" Feb 9 00:52:53.257539 env[1119]: time="2024-02-09T00:52:53.257496792Z" level=error msg="StopPodSandbox for \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\" failed" error="failed to destroy network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:53.257626 kubelet[1427]: E0209 00:52:53.257601 1427 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:52:53.257626 kubelet[1427]: E0209 00:52:53.257627 1427 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d"} Feb 9 00:52:53.257711 kubelet[1427]: E0209 00:52:53.257659 1427 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b1ab66ca-725b-4df3-a0f1-e106971a48e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:52:53.257711 kubelet[1427]: E0209 00:52:53.257684 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b1ab66ca-725b-4df3-a0f1-e106971a48e5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-7r5tn" podUID="b1ab66ca-725b-4df3-a0f1-e106971a48e5" Feb 9 00:52:53.312118 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d-shm.mount: Deactivated successfully. Feb 9 00:52:54.114914 kubelet[1427]: E0209 00:52:54.114871 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:54.199134 systemd[1]: Created slice kubepods-besteffort-podcaff008f_3171_4225_b413_c8276d238236.slice. Feb 9 00:52:54.200794 env[1119]: time="2024-02-09T00:52:54.200764891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dt2tl,Uid:caff008f-3171-4225-b413-c8276d238236,Namespace:calico-system,Attempt:0,}" Feb 9 00:52:55.094343 env[1119]: time="2024-02-09T00:52:55.094283428Z" level=error msg="Failed to destroy network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:55.094620 env[1119]: time="2024-02-09T00:52:55.094591147Z" level=error msg="encountered an error cleaning up failed sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:55.094669 env[1119]: time="2024-02-09T00:52:55.094634065Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dt2tl,Uid:caff008f-3171-4225-b413-c8276d238236,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:55.094906 kubelet[1427]: E0209 00:52:55.094871 1427 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:55.094961 kubelet[1427]: E0209 00:52:55.094935 1427 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dt2tl" Feb 9 00:52:55.094990 kubelet[1427]: E0209 00:52:55.094963 1427 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dt2tl" Feb 9 00:52:55.095041 kubelet[1427]: E0209 00:52:55.095026 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dt2tl_calico-system(caff008f-3171-4225-b413-c8276d238236)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dt2tl_calico-system(caff008f-3171-4225-b413-c8276d238236)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:55.095707 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8-shm.mount: Deactivated successfully. Feb 9 00:52:55.105923 kubelet[1427]: E0209 00:52:55.105908 1427 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:55.115219 kubelet[1427]: E0209 00:52:55.115204 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:55.235138 kubelet[1427]: I0209 00:52:55.235111 1427 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:52:55.235644 env[1119]: time="2024-02-09T00:52:55.235604475Z" level=info msg="StopPodSandbox for \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\"" Feb 9 00:52:55.256724 env[1119]: time="2024-02-09T00:52:55.256661181Z" level=error msg="StopPodSandbox for \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\" failed" error="failed to destroy network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:55.256940 kubelet[1427]: E0209 00:52:55.256916 1427 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:52:55.256993 kubelet[1427]: E0209 00:52:55.256958 1427 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8"} Feb 9 00:52:55.256993 kubelet[1427]: E0209 00:52:55.256988 1427 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"caff008f-3171-4225-b413-c8276d238236\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:52:55.257110 kubelet[1427]: E0209 00:52:55.257016 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"caff008f-3171-4225-b413-c8276d238236\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dt2tl" podUID="caff008f-3171-4225-b413-c8276d238236" Feb 9 00:52:56.116381 kubelet[1427]: E0209 00:52:56.116323 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:57.117200 kubelet[1427]: E0209 00:52:57.117143 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:58.105127 kubelet[1427]: I0209 00:52:58.105064 1427 topology_manager.go:215] "Topology Admit Handler" podUID="1e2ff3da-736b-4b4f-92fd-16822f1ecfce" podNamespace="default" podName="nginx-deployment-6d5f899847-255gl" Feb 9 00:52:58.109280 systemd[1]: Created slice kubepods-besteffort-pod1e2ff3da_736b_4b4f_92fd_16822f1ecfce.slice. Feb 9 00:52:58.117633 kubelet[1427]: E0209 00:52:58.117597 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:58.135995 kubelet[1427]: I0209 00:52:58.135953 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rjgvl\" (UniqueName: \"kubernetes.io/projected/1e2ff3da-736b-4b4f-92fd-16822f1ecfce-kube-api-access-rjgvl\") pod \"nginx-deployment-6d5f899847-255gl\" (UID: \"1e2ff3da-736b-4b4f-92fd-16822f1ecfce\") " pod="default/nginx-deployment-6d5f899847-255gl" Feb 9 00:52:58.412333 env[1119]: time="2024-02-09T00:52:58.412289197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-255gl,Uid:1e2ff3da-736b-4b4f-92fd-16822f1ecfce,Namespace:default,Attempt:0,}" Feb 9 00:52:58.812530 env[1119]: time="2024-02-09T00:52:58.812415590Z" level=error msg="Failed to destroy network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:58.812789 env[1119]: time="2024-02-09T00:52:58.812756844Z" level=error msg="encountered an error cleaning up failed sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:58.812827 env[1119]: time="2024-02-09T00:52:58.812803490Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-255gl,Uid:1e2ff3da-736b-4b4f-92fd-16822f1ecfce,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:58.813094 kubelet[1427]: E0209 00:52:58.813064 1427 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:58.813153 kubelet[1427]: E0209 00:52:58.813123 1427 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-255gl" Feb 9 00:52:58.813153 kubelet[1427]: E0209 00:52:58.813146 1427 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-255gl" Feb 9 00:52:58.813203 kubelet[1427]: E0209 00:52:58.813199 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-255gl_default(1e2ff3da-736b-4b4f-92fd-16822f1ecfce)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-255gl_default(1e2ff3da-736b-4b4f-92fd-16822f1ecfce)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-255gl" podUID="1e2ff3da-736b-4b4f-92fd-16822f1ecfce" Feb 9 00:52:58.813765 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322-shm.mount: Deactivated successfully. Feb 9 00:52:59.117991 kubelet[1427]: E0209 00:52:59.117956 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:52:59.242364 kubelet[1427]: I0209 00:52:59.242338 1427 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:52:59.242907 env[1119]: time="2024-02-09T00:52:59.242862879Z" level=info msg="StopPodSandbox for \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\"" Feb 9 00:52:59.263797 env[1119]: time="2024-02-09T00:52:59.263733899Z" level=error msg="StopPodSandbox for \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\" failed" error="failed to destroy network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 00:52:59.264048 kubelet[1427]: E0209 00:52:59.264022 1427 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:52:59.264122 kubelet[1427]: E0209 00:52:59.264064 1427 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322"} Feb 9 00:52:59.264122 kubelet[1427]: E0209 00:52:59.264105 1427 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1e2ff3da-736b-4b4f-92fd-16822f1ecfce\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 00:52:59.264206 kubelet[1427]: E0209 00:52:59.264130 1427 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1e2ff3da-736b-4b4f-92fd-16822f1ecfce\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-255gl" podUID="1e2ff3da-736b-4b4f-92fd-16822f1ecfce" Feb 9 00:52:59.692851 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3518440358.mount: Deactivated successfully. Feb 9 00:53:00.118950 kubelet[1427]: E0209 00:53:00.118905 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:00.168648 env[1119]: time="2024-02-09T00:53:00.168601887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:00.170109 env[1119]: time="2024-02-09T00:53:00.170059309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:00.171716 env[1119]: time="2024-02-09T00:53:00.171677516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:00.173147 env[1119]: time="2024-02-09T00:53:00.173117877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:00.173637 env[1119]: time="2024-02-09T00:53:00.173606523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 00:53:00.180530 env[1119]: time="2024-02-09T00:53:00.180497829Z" level=info msg="CreateContainer within sandbox \"43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 00:53:00.195518 env[1119]: time="2024-02-09T00:53:00.195486301Z" level=info msg="CreateContainer within sandbox \"43ee77bfecbba27ecd5f0caa8cac81d820ea51b40c23b61a44889bfcf2556aec\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ca3bfade6d9bca632b5c0c99a9e8e2f8983793d912168c4e969a2a81a8259ea7\"" Feb 9 00:53:00.195897 env[1119]: time="2024-02-09T00:53:00.195871537Z" level=info msg="StartContainer for \"ca3bfade6d9bca632b5c0c99a9e8e2f8983793d912168c4e969a2a81a8259ea7\"" Feb 9 00:53:00.209718 systemd[1]: Started cri-containerd-ca3bfade6d9bca632b5c0c99a9e8e2f8983793d912168c4e969a2a81a8259ea7.scope. Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.222580 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 00:53:00.222651 kernel: audit: type=1400 audit(1707439980.220:661): avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1505 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:00.228970 kernel: audit: type=1300 audit(1707439980.220:661): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1505 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:00.229032 kernel: audit: type=1327 audit(1707439980.220:661): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336266616465366439626361363332623563306339396139653865 Feb 9 00:53:00.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336266616465366439626361363332623563306339396139653865 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.234846 kernel: audit: type=1400 audit(1707439980.220:662): avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.234934 kernel: audit: type=1400 audit(1707439980.220:662): avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.237096 kernel: audit: type=1400 audit(1707439980.220:662): avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.245551 kernel: audit: type=1400 audit(1707439980.220:662): avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.245608 kernel: audit: type=1400 audit(1707439980.220:662): avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.245623 kernel: audit: type=1400 audit(1707439980.220:662): avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.250633 kernel: audit: type=1400 audit(1707439980.220:662): avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.220000 audit: BPF prog-id=81 op=LOAD Feb 9 00:53:00.220000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000246f0 items=0 ppid=1505 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:00.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336266616465366439626361363332623563306339396139653865 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.224000 audit: BPF prog-id=82 op=LOAD Feb 9 00:53:00.224000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024738 items=0 ppid=1505 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:00.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336266616465366439626361363332623563306339396139653865 Feb 9 00:53:00.227000 audit: BPF prog-id=82 op=UNLOAD Feb 9 00:53:00.227000 audit: BPF prog-id=81 op=UNLOAD Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:00.227000 audit: BPF prog-id=83 op=LOAD Feb 9 00:53:00.227000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000247c8 items=0 ppid=1505 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:00.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361336266616465366439626361363332623563306339396139653865 Feb 9 00:53:00.252463 env[1119]: time="2024-02-09T00:53:00.252417998Z" level=info msg="StartContainer for \"ca3bfade6d9bca632b5c0c99a9e8e2f8983793d912168c4e969a2a81a8259ea7\" returns successfully" Feb 9 00:53:00.309966 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 00:53:00.310087 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 00:53:01.119974 kubelet[1427]: E0209 00:53:01.119903 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:01.250989 kubelet[1427]: E0209 00:53:01.250957 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:01.384496 kubelet[1427]: I0209 00:53:01.384368 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-hspg4" podStartSLOduration=4.275804583 podCreationTimestamp="2024-02-09 00:52:36 +0000 UTC" firstStartedPulling="2024-02-09 00:52:39.065306097 +0000 UTC m=+4.210432328" lastFinishedPulling="2024-02-09 00:53:00.173816378 +0000 UTC m=+25.318942609" observedRunningTime="2024-02-09 00:53:01.384068341 +0000 UTC m=+26.529194603" watchObservedRunningTime="2024-02-09 00:53:01.384314864 +0000 UTC m=+26.529441105" Feb 9 00:53:01.518000 audit[2296]: AVC avc: denied { write } for pid=2296 comm="tee" name="fd" dev="proc" ino=19883 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:53:01.518000 audit[2296]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1cdf5990 a2=241 a3=1b6 items=1 ppid=2268 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.518000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 00:53:01.522000 audit[2289]: AVC avc: denied { write } for pid=2289 comm="tee" name="fd" dev="proc" ino=20884 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:53:01.518000 audit: PATH item=0 name="/dev/fd/63" inode=19877 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:01.518000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:53:01.522000 audit[2289]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce098c98e a2=241 a3=1b6 items=1 ppid=2271 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.522000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 00:53:01.522000 audit: PATH item=0 name="/dev/fd/63" inode=20876 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:01.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:53:01.526000 audit[2317]: AVC avc: denied { write } for pid=2317 comm="tee" name="fd" dev="proc" ino=19890 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:53:01.526000 audit[2317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0722c97e a2=241 a3=1b6 items=1 ppid=2269 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.526000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 00:53:01.526000 audit: PATH item=0 name="/dev/fd/63" inode=19886 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:01.526000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:53:01.534000 audit[2330]: AVC avc: denied { write } for pid=2330 comm="tee" name="fd" dev="proc" ino=19189 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:53:01.534000 audit[2330]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc12e3598e a2=241 a3=1b6 items=1 ppid=2274 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.535000 audit[2334]: AVC avc: denied { write } for pid=2334 comm="tee" name="fd" dev="proc" ino=18394 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:53:01.534000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 00:53:01.534000 audit: PATH item=0 name="/dev/fd/63" inode=18383 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:01.534000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:53:01.535000 audit[2334]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2255198e a2=241 a3=1b6 items=1 ppid=2275 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.535000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 00:53:01.535000 audit: PATH item=0 name="/dev/fd/63" inode=18388 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:01.535000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:53:01.545000 audit[2343]: AVC avc: denied { write } for pid=2343 comm="tee" name="fd" dev="proc" ino=20894 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:53:01.545000 audit[2343]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca71b997f a2=241 a3=1b6 items=1 ppid=2302 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.545000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 00:53:01.545000 audit: PATH item=0 name="/dev/fd/63" inode=18391 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:01.545000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:53:01.561000 audit[2337]: AVC avc: denied { write } for pid=2337 comm="tee" name="fd" dev="proc" ino=20898 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 00:53:01.561000 audit[2337]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc66ce098f a2=241 a3=1b6 items=1 ppid=2285 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.561000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 00:53:01.561000 audit: PATH item=0 name="/dev/fd/63" inode=19186 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:01.561000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 00:53:01.648105 kernel: Initializing XFRM netlink socket Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit: BPF prog-id=84 op=LOAD Feb 9 00:53:01.742000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7f835d90 a2=70 a3=7fcf92a33000 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:53:01.742000 audit: BPF prog-id=84 op=UNLOAD Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit: BPF prog-id=85 op=LOAD Feb 9 00:53:01.742000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7f835d90 a2=70 a3=6e items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:53:01.742000 audit: BPF prog-id=85 op=UNLOAD Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff7f835d40 a2=70 a3=7fff7f835d90 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit: BPF prog-id=86 op=LOAD Feb 9 00:53:01.742000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff7f835d20 a2=70 a3=7fff7f835d90 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:53:01.742000 audit: BPF prog-id=86 op=UNLOAD Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7f835e00 a2=70 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7f835df0 a2=70 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff7f835e30 a2=70 a3=0 items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.742000 audit: BPF prog-id=87 op=LOAD Feb 9 00:53:01.742000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff7f835d50 a2=70 a3=ffffffff items=0 ppid=2276 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 00:53:01.745000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.745000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb9df5240 a2=70 a3=208 items=0 ppid=2276 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.745000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 00:53:01.745000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:01.745000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffb9df5110 a2=70 a3=3 items=0 ppid=2276 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.745000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 00:53:01.751000 audit: BPF prog-id=87 op=UNLOAD Feb 9 00:53:01.783000 audit[2448]: NETFILTER_CFG table=mangle:67 family=2 entries=19 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:01.783000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffedcccc0c0 a2=0 a3=7ffedcccc0ac items=0 ppid=2276 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.783000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:01.784000 audit[2447]: NETFILTER_CFG table=raw:68 family=2 entries=19 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:01.784000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffdac7ad3b0 a2=0 a3=55cc558b8000 items=0 ppid=2276 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.784000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:01.784000 audit[2443]: NETFILTER_CFG table=nat:69 family=2 entries=16 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:01.784000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff519eb590 a2=0 a3=0 items=0 ppid=2276 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.784000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:01.788000 audit[2451]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:01.788000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe54f8d540 a2=0 a3=7ffe54f8d52c items=0 ppid=2276 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:01.788000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:02.120268 kubelet[1427]: E0209 00:53:02.120226 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:02.252875 kubelet[1427]: E0209 00:53:02.252850 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:02.657096 systemd-networkd[1014]: vxlan.calico: Link UP Feb 9 00:53:02.657103 systemd-networkd[1014]: vxlan.calico: Gained carrier Feb 9 00:53:03.121253 kubelet[1427]: E0209 00:53:03.121218 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:04.121768 kubelet[1427]: E0209 00:53:04.121735 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:04.185201 env[1119]: time="2024-02-09T00:53:04.185163964Z" level=info msg="StopPodSandbox for \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\"" Feb 9 00:53:04.200253 systemd-networkd[1014]: vxlan.calico: Gained IPv6LL Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.368 [INFO][2499] k8s.go 578: Cleaning up netns ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.369 [INFO][2499] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" iface="eth0" netns="/var/run/netns/cni-8c406ca4-f457-cd19-a7ad-ebdd10c3e2c1" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.369 [INFO][2499] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" iface="eth0" netns="/var/run/netns/cni-8c406ca4-f457-cd19-a7ad-ebdd10c3e2c1" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.369 [INFO][2499] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" iface="eth0" netns="/var/run/netns/cni-8c406ca4-f457-cd19-a7ad-ebdd10c3e2c1" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.369 [INFO][2499] k8s.go 585: Releasing IP address(es) ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.369 [INFO][2499] utils.go 188: Calico CNI releasing IP address ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.383 [INFO][2507] ipam_plugin.go 415: Releasing address using handleID ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.384 [INFO][2507] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.384 [INFO][2507] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.609 [WARNING][2507] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.609 [INFO][2507] ipam_plugin.go 443: Releasing address using workloadID ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.610 [INFO][2507] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:04.612645 env[1119]: 2024-02-09 00:53:04.611 [INFO][2499] k8s.go 591: Teardown processing complete. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:04.613047 env[1119]: time="2024-02-09T00:53:04.612785319Z" level=info msg="TearDown network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\" successfully" Feb 9 00:53:04.613047 env[1119]: time="2024-02-09T00:53:04.612821476Z" level=info msg="StopPodSandbox for \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\" returns successfully" Feb 9 00:53:04.613222 kubelet[1427]: E0209 00:53:04.613197 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:04.613593 env[1119]: time="2024-02-09T00:53:04.613557142Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7r5tn,Uid:b1ab66ca-725b-4df3-a0f1-e106971a48e5,Namespace:kube-system,Attempt:1,}" Feb 9 00:53:04.614313 systemd[1]: run-netns-cni\x2d8c406ca4\x2df457\x2dcd19\x2da7ad\x2debdd10c3e2c1.mount: Deactivated successfully. Feb 9 00:53:05.122246 kubelet[1427]: E0209 00:53:05.122223 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:05.181476 env[1119]: time="2024-02-09T00:53:05.181444224Z" level=info msg="StopPodSandbox for \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\"" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.244 [INFO][2531] k8s.go 578: Cleaning up netns ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.244 [INFO][2531] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" iface="eth0" netns="/var/run/netns/cni-36c4ba54-5aed-4714-f9cd-d06f4dc897db" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.244 [INFO][2531] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" iface="eth0" netns="/var/run/netns/cni-36c4ba54-5aed-4714-f9cd-d06f4dc897db" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.245 [INFO][2531] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" iface="eth0" netns="/var/run/netns/cni-36c4ba54-5aed-4714-f9cd-d06f4dc897db" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.245 [INFO][2531] k8s.go 585: Releasing IP address(es) ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.245 [INFO][2531] utils.go 188: Calico CNI releasing IP address ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.260 [INFO][2539] ipam_plugin.go 415: Releasing address using handleID ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.260 [INFO][2539] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.260 [INFO][2539] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.447 [WARNING][2539] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.447 [INFO][2539] ipam_plugin.go 443: Releasing address using workloadID ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.448 [INFO][2539] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:05.451577 env[1119]: 2024-02-09 00:53:05.450 [INFO][2531] k8s.go 591: Teardown processing complete. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:05.452957 systemd[1]: run-netns-cni\x2d36c4ba54\x2d5aed\x2d4714\x2df9cd\x2dd06f4dc897db.mount: Deactivated successfully. Feb 9 00:53:05.453453 env[1119]: time="2024-02-09T00:53:05.453416097Z" level=info msg="TearDown network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\" successfully" Feb 9 00:53:05.453453 env[1119]: time="2024-02-09T00:53:05.453450620Z" level=info msg="StopPodSandbox for \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\" returns successfully" Feb 9 00:53:05.454118 env[1119]: time="2024-02-09T00:53:05.454082997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f44497d7d-9tsq8,Uid:11558908-1e80-422d-9511-06bbda4b3f1e,Namespace:calico-system,Attempt:1,}" Feb 9 00:53:06.017110 systemd-networkd[1014]: cali6ac050d244a: Link UP Feb 9 00:53:06.019147 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 00:53:06.019321 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6ac050d244a: link becomes ready Feb 9 00:53:06.019353 systemd-networkd[1014]: cali6ac050d244a: Gained carrier Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:05.963 [INFO][2547] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0 calico-kube-controllers-5f44497d7d- calico-system 11558908-1e80-422d-9511-06bbda4b3f1e 835 0 2024-02-09 00:52:26 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5f44497d7d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 10.0.0.120 calico-kube-controllers-5f44497d7d-9tsq8 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6ac050d244a [] []}} ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Namespace="calico-system" Pod="calico-kube-controllers-5f44497d7d-9tsq8" WorkloadEndpoint="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:05.964 [INFO][2547] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Namespace="calico-system" Pod="calico-kube-controllers-5f44497d7d-9tsq8" WorkloadEndpoint="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:05.984 [INFO][2579] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" HandleID="k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:05.995 [INFO][2579] ipam_plugin.go 268: Auto assigning IP ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" HandleID="k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025d9b0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.120", "pod":"calico-kube-controllers-5f44497d7d-9tsq8", "timestamp":"2024-02-09 00:53:05.984754815 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:05.995 [INFO][2579] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:05.995 [INFO][2579] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:05.995 [INFO][2579] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:05.996 [INFO][2579] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.001 [INFO][2579] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.003 [INFO][2579] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.005 [INFO][2579] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.006 [INFO][2579] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.006 [INFO][2579] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.007 [INFO][2579] ipam.go 1682: Creating new handle: k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.010 [INFO][2579] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.013 [INFO][2579] ipam.go 1216: Successfully claimed IPs: [192.168.77.65/26] block=192.168.77.64/26 handle="k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.014 [INFO][2579] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.65/26] handle="k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" host="10.0.0.120" Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.014 [INFO][2579] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:06.028314 env[1119]: 2024-02-09 00:53:06.014 [INFO][2579] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.65/26] IPv6=[] ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" HandleID="k8s-pod-network.607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:06.029196 env[1119]: 2024-02-09 00:53:06.015 [INFO][2547] k8s.go 385: Populated endpoint ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Namespace="calico-system" Pod="calico-kube-controllers-5f44497d7d-9tsq8" WorkloadEndpoint="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0", GenerateName:"calico-kube-controllers-5f44497d7d-", Namespace:"calico-system", SelfLink:"", UID:"11558908-1e80-422d-9511-06bbda4b3f1e", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f44497d7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"calico-kube-controllers-5f44497d7d-9tsq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6ac050d244a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:06.029196 env[1119]: 2024-02-09 00:53:06.015 [INFO][2547] k8s.go 386: Calico CNI using IPs: [192.168.77.65/32] ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Namespace="calico-system" Pod="calico-kube-controllers-5f44497d7d-9tsq8" WorkloadEndpoint="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:06.029196 env[1119]: 2024-02-09 00:53:06.015 [INFO][2547] dataplane_linux.go 68: Setting the host side veth name to cali6ac050d244a ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Namespace="calico-system" Pod="calico-kube-controllers-5f44497d7d-9tsq8" WorkloadEndpoint="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:06.029196 env[1119]: 2024-02-09 00:53:06.019 [INFO][2547] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Namespace="calico-system" Pod="calico-kube-controllers-5f44497d7d-9tsq8" WorkloadEndpoint="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:06.029196 env[1119]: 2024-02-09 00:53:06.019 [INFO][2547] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Namespace="calico-system" Pod="calico-kube-controllers-5f44497d7d-9tsq8" WorkloadEndpoint="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0", GenerateName:"calico-kube-controllers-5f44497d7d-", Namespace:"calico-system", SelfLink:"", UID:"11558908-1e80-422d-9511-06bbda4b3f1e", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f44497d7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d", Pod:"calico-kube-controllers-5f44497d7d-9tsq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6ac050d244a", MAC:"de:31:27:81:6c:17", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:06.029196 env[1119]: 2024-02-09 00:53:06.025 [INFO][2547] k8s.go 491: Wrote updated endpoint to datastore ContainerID="607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d" Namespace="calico-system" Pod="calico-kube-controllers-5f44497d7d-9tsq8" WorkloadEndpoint="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:06.039000 audit[2620]: NETFILTER_CFG table=filter:71 family=2 entries=36 op=nft_register_chain pid=2620 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:06.041366 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 00:53:06.041424 kernel: audit: type=1325 audit(1707439986.039:692): table=filter:71 family=2 entries=36 op=nft_register_chain pid=2620 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:06.039000 audit[2620]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffcc4c62390 a2=0 a3=7ffcc4c6237c items=0 ppid=2276 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.047503 kernel: audit: type=1300 audit(1707439986.039:692): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffcc4c62390 a2=0 a3=7ffcc4c6237c items=0 ppid=2276 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.047562 kernel: audit: type=1327 audit(1707439986.039:692): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:06.039000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:06.049142 env[1119]: time="2024-02-09T00:53:06.041802944Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:53:06.049142 env[1119]: time="2024-02-09T00:53:06.041840323Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:53:06.049142 env[1119]: time="2024-02-09T00:53:06.041851303Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:53:06.049142 env[1119]: time="2024-02-09T00:53:06.042066931Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d pid=2621 runtime=io.containerd.runc.v2 Feb 9 00:53:06.055051 systemd-networkd[1014]: calif444f07b02b: Link UP Feb 9 00:53:06.062480 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif444f07b02b: link becomes ready Feb 9 00:53:06.060360 systemd[1]: Started cri-containerd-607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d.scope. Feb 9 00:53:06.062286 systemd-networkd[1014]: calif444f07b02b: Gained carrier Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.074557 kernel: audit: type=1400 audit(1707439986.069:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.074606 kernel: audit: type=1400 audit(1707439986.069:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.074624 kernel: audit: type=1400 audit(1707439986.069:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.076548 kernel: audit: type=1400 audit(1707439986.069:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.078534 kernel: audit: type=1400 audit(1707439986.069:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.082432 kernel: audit: type=1400 audit(1707439986.069:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.083907 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:53:06.084499 kernel: audit: type=1400 audit(1707439986.069:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit: BPF prog-id=88 op=LOAD Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2621 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630373433343537396635363839356439343366393038623635646534 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2621 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630373433343537396635363839356439343366393038623635646534 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.073000 audit: BPF prog-id=89 op=LOAD Feb 9 00:53:06.073000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002857e0 items=0 ppid=2621 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630373433343537396635363839356439343366393038623635646534 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.075000 audit: BPF prog-id=90 op=LOAD Feb 9 00:53:06.075000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000285828 items=0 ppid=2621 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630373433343537396635363839356439343366393038623635646534 Feb 9 00:53:06.077000 audit: BPF prog-id=90 op=UNLOAD Feb 9 00:53:06.077000 audit: BPF prog-id=89 op=UNLOAD Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.077000 audit: BPF prog-id=91 op=LOAD Feb 9 00:53:06.077000 audit[2631]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000285c38 items=0 ppid=2621 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630373433343537396635363839356439343366393038623635646534 Feb 9 00:53:06.104809 env[1119]: time="2024-02-09T00:53:06.104758513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f44497d7d-9tsq8,Uid:11558908-1e80-422d-9511-06bbda4b3f1e,Namespace:calico-system,Attempt:1,} returns sandbox id \"607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d\"" Feb 9 00:53:06.106252 env[1119]: time="2024-02-09T00:53:06.106224210Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 00:53:06.123397 kubelet[1427]: E0209 00:53:06.123341 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:05.964 [INFO][2559] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0 coredns-5dd5756b68- kube-system b1ab66ca-725b-4df3-a0f1-e106971a48e5 831 0 2024-02-09 00:52:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.0.0.120 coredns-5dd5756b68-7r5tn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif444f07b02b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Namespace="kube-system" Pod="coredns-5dd5756b68-7r5tn" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:05.965 [INFO][2559] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Namespace="kube-system" Pod="coredns-5dd5756b68-7r5tn" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:05.987 [INFO][2584] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" HandleID="k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:05.996 [INFO][2584] ipam_plugin.go 268: Auto assigning IP ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" HandleID="k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b6550), Attrs:map[string]string{"namespace":"kube-system", "node":"10.0.0.120", "pod":"coredns-5dd5756b68-7r5tn", "timestamp":"2024-02-09 00:53:05.987323744 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:05.996 [INFO][2584] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.014 [INFO][2584] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.014 [INFO][2584] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.020 [INFO][2584] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.023 [INFO][2584] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.028 [INFO][2584] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.030 [INFO][2584] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.032 [INFO][2584] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.032 [INFO][2584] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.034 [INFO][2584] ipam.go 1682: Creating new handle: k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6 Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.037 [INFO][2584] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.049 [INFO][2584] ipam.go 1216: Successfully claimed IPs: [192.168.77.66/26] block=192.168.77.64/26 handle="k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.049 [INFO][2584] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.66/26] handle="k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" host="10.0.0.120" Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.049 [INFO][2584] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:06.149432 env[1119]: 2024-02-09 00:53:06.049 [INFO][2584] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.66/26] IPv6=[] ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" HandleID="k8s-pod-network.9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:06.150048 env[1119]: 2024-02-09 00:53:06.052 [INFO][2559] k8s.go 385: Populated endpoint ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Namespace="kube-system" Pod="coredns-5dd5756b68-7r5tn" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b1ab66ca-725b-4df3-a0f1-e106971a48e5", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"coredns-5dd5756b68-7r5tn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif444f07b02b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:06.150048 env[1119]: 2024-02-09 00:53:06.052 [INFO][2559] k8s.go 386: Calico CNI using IPs: [192.168.77.66/32] ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Namespace="kube-system" Pod="coredns-5dd5756b68-7r5tn" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:06.150048 env[1119]: 2024-02-09 00:53:06.052 [INFO][2559] dataplane_linux.go 68: Setting the host side veth name to calif444f07b02b ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Namespace="kube-system" Pod="coredns-5dd5756b68-7r5tn" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:06.150048 env[1119]: 2024-02-09 00:53:06.062 [INFO][2559] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Namespace="kube-system" Pod="coredns-5dd5756b68-7r5tn" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:06.150048 env[1119]: 2024-02-09 00:53:06.062 [INFO][2559] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Namespace="kube-system" Pod="coredns-5dd5756b68-7r5tn" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b1ab66ca-725b-4df3-a0f1-e106971a48e5", ResourceVersion:"831", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6", Pod:"coredns-5dd5756b68-7r5tn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif444f07b02b", MAC:"e2:50:70:08:3f:fb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:06.150048 env[1119]: 2024-02-09 00:53:06.148 [INFO][2559] k8s.go 491: Wrote updated endpoint to datastore ContainerID="9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6" Namespace="kube-system" Pod="coredns-5dd5756b68-7r5tn" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:06.182398 env[1119]: time="2024-02-09T00:53:06.182354772Z" level=info msg="StopPodSandbox for \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\"" Feb 9 00:53:06.184068 env[1119]: time="2024-02-09T00:53:06.183932296Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:53:06.184068 env[1119]: time="2024-02-09T00:53:06.183963423Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:53:06.184068 env[1119]: time="2024-02-09T00:53:06.183972470Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:53:06.184261 env[1119]: time="2024-02-09T00:53:06.184225438Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6 pid=2676 runtime=io.containerd.runc.v2 Feb 9 00:53:06.186000 audit[2692]: NETFILTER_CFG table=filter:72 family=2 entries=40 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:06.186000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffca59b0fe0 a2=0 a3=7ffca59b0fcc items=0 ppid=2276 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.186000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:06.197327 systemd[1]: Started cri-containerd-9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6.scope. Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit: BPF prog-id=92 op=LOAD Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2676 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363464613063653831656632646632343465623638303935663339 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2676 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363464613063653831656632646632343465623638303935663339 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit: BPF prog-id=93 op=LOAD Feb 9 00:53:06.208000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028ac10 items=0 ppid=2676 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363464613063653831656632646632343465623638303935663339 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.208000 audit: BPF prog-id=94 op=LOAD Feb 9 00:53:06.208000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028ac58 items=0 ppid=2676 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363464613063653831656632646632343465623638303935663339 Feb 9 00:53:06.209000 audit: BPF prog-id=94 op=UNLOAD Feb 9 00:53:06.209000 audit: BPF prog-id=93 op=UNLOAD Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { perfmon } for pid=2694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit[2694]: AVC avc: denied { bpf } for pid=2694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.209000 audit: BPF prog-id=95 op=LOAD Feb 9 00:53:06.209000 audit[2694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b068 items=0 ppid=2676 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363464613063653831656632646632343465623638303935663339 Feb 9 00:53:06.211111 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:53:06.233370 env[1119]: time="2024-02-09T00:53:06.233324877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7r5tn,Uid:b1ab66ca-725b-4df3-a0f1-e106971a48e5,Namespace:kube-system,Attempt:1,} returns sandbox id \"9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6\"" Feb 9 00:53:06.234089 kubelet[1427]: E0209 00:53:06.234058 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.224 [INFO][2704] k8s.go 578: Cleaning up netns ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.224 [INFO][2704] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" iface="eth0" netns="/var/run/netns/cni-cb772e94-98b3-bb02-d0bc-a6488ea9206f" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.224 [INFO][2704] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" iface="eth0" netns="/var/run/netns/cni-cb772e94-98b3-bb02-d0bc-a6488ea9206f" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.224 [INFO][2704] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" iface="eth0" netns="/var/run/netns/cni-cb772e94-98b3-bb02-d0bc-a6488ea9206f" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.224 [INFO][2704] k8s.go 585: Releasing IP address(es) ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.225 [INFO][2704] utils.go 188: Calico CNI releasing IP address ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.243 [INFO][2728] ipam_plugin.go 415: Releasing address using handleID ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.243 [INFO][2728] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.243 [INFO][2728] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.310 [WARNING][2728] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.310 [INFO][2728] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.312 [INFO][2728] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:06.314839 env[1119]: 2024-02-09 00:53:06.313 [INFO][2704] k8s.go 591: Teardown processing complete. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:06.315299 env[1119]: time="2024-02-09T00:53:06.315037568Z" level=info msg="TearDown network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\" successfully" Feb 9 00:53:06.315299 env[1119]: time="2024-02-09T00:53:06.315121984Z" level=info msg="StopPodSandbox for \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\" returns successfully" Feb 9 00:53:06.315388 kubelet[1427]: E0209 00:53:06.315366 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:06.315966 env[1119]: time="2024-02-09T00:53:06.315937571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mqf6q,Uid:7d87966c-cf98-4792-a947-3dded052fd55,Namespace:kube-system,Attempt:1,}" Feb 9 00:53:06.594811 systemd-networkd[1014]: caliaaa52146270: Link UP Feb 9 00:53:06.595845 systemd-networkd[1014]: caliaaa52146270: Gained carrier Feb 9 00:53:06.596246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaaa52146270: link becomes ready Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.363 [INFO][2742] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0 coredns-5dd5756b68- kube-system 7d87966c-cf98-4792-a947-3dded052fd55 848 0 2024-02-09 00:52:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.0.0.120 coredns-5dd5756b68-mqf6q eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliaaa52146270 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Namespace="kube-system" Pod="coredns-5dd5756b68-mqf6q" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.363 [INFO][2742] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Namespace="kube-system" Pod="coredns-5dd5756b68-mqf6q" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.384 [INFO][2757] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" HandleID="k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.393 [INFO][2757] ipam_plugin.go 268: Auto assigning IP ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" HandleID="k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050520), Attrs:map[string]string{"namespace":"kube-system", "node":"10.0.0.120", "pod":"coredns-5dd5756b68-mqf6q", "timestamp":"2024-02-09 00:53:06.384159687 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.393 [INFO][2757] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.393 [INFO][2757] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.393 [INFO][2757] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.397 [INFO][2757] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.402 [INFO][2757] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.404 [INFO][2757] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.406 [INFO][2757] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.407 [INFO][2757] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.407 [INFO][2757] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.575 [INFO][2757] ipam.go 1682: Creating new handle: k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9 Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.578 [INFO][2757] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.591 [INFO][2757] ipam.go 1216: Successfully claimed IPs: [192.168.77.67/26] block=192.168.77.64/26 handle="k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.591 [INFO][2757] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.67/26] handle="k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" host="10.0.0.120" Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.591 [INFO][2757] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:06.665859 env[1119]: 2024-02-09 00:53:06.591 [INFO][2757] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.67/26] IPv6=[] ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" HandleID="k8s-pod-network.13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.666598 env[1119]: 2024-02-09 00:53:06.592 [INFO][2742] k8s.go 385: Populated endpoint ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Namespace="kube-system" Pod="coredns-5dd5756b68-mqf6q" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"7d87966c-cf98-4792-a947-3dded052fd55", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"coredns-5dd5756b68-mqf6q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.77.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliaaa52146270", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:06.666598 env[1119]: 2024-02-09 00:53:06.592 [INFO][2742] k8s.go 386: Calico CNI using IPs: [192.168.77.67/32] ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Namespace="kube-system" Pod="coredns-5dd5756b68-mqf6q" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.666598 env[1119]: 2024-02-09 00:53:06.592 [INFO][2742] dataplane_linux.go 68: Setting the host side veth name to caliaaa52146270 ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Namespace="kube-system" Pod="coredns-5dd5756b68-mqf6q" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.666598 env[1119]: 2024-02-09 00:53:06.595 [INFO][2742] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Namespace="kube-system" Pod="coredns-5dd5756b68-mqf6q" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.666598 env[1119]: 2024-02-09 00:53:06.596 [INFO][2742] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Namespace="kube-system" Pod="coredns-5dd5756b68-mqf6q" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"7d87966c-cf98-4792-a947-3dded052fd55", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9", Pod:"coredns-5dd5756b68-mqf6q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.77.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliaaa52146270", MAC:"ce:bb:eb:41:b6:d5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:06.666598 env[1119]: 2024-02-09 00:53:06.664 [INFO][2742] k8s.go 491: Wrote updated endpoint to datastore ContainerID="13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9" Namespace="kube-system" Pod="coredns-5dd5756b68-mqf6q" WorkloadEndpoint="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:06.679000 audit[2780]: NETFILTER_CFG table=filter:73 family=2 entries=34 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:06.679000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7fff28467c40 a2=0 a3=7fff28467c2c items=0 ppid=2276 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:06.790345 env[1119]: time="2024-02-09T00:53:06.790292144Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:53:06.790519 env[1119]: time="2024-02-09T00:53:06.790495820Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:53:06.790606 env[1119]: time="2024-02-09T00:53:06.790584003Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:53:06.790816 env[1119]: time="2024-02-09T00:53:06.790793570Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9 pid=2790 runtime=io.containerd.runc.v2 Feb 9 00:53:06.802799 systemd[1]: Started cri-containerd-13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9.scope. Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit: BPF prog-id=96 op=LOAD Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2790 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623365666663303265396165363730336534353038613536623262 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2790 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623365666663303265396165363730336534353038613536623262 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.813000 audit: BPF prog-id=97 op=LOAD Feb 9 00:53:06.813000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029a6d0 items=0 ppid=2790 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623365666663303265396165363730336534353038613536623262 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit: BPF prog-id=98 op=LOAD Feb 9 00:53:06.814000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029a718 items=0 ppid=2790 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623365666663303265396165363730336534353038613536623262 Feb 9 00:53:06.814000 audit: BPF prog-id=98 op=UNLOAD Feb 9 00:53:06.814000 audit: BPF prog-id=97 op=UNLOAD Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:06.814000 audit: BPF prog-id=99 op=LOAD Feb 9 00:53:06.814000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029ab28 items=0 ppid=2790 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:06.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133623365666663303265396165363730336534353038613536623262 Feb 9 00:53:06.815751 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:53:06.836510 env[1119]: time="2024-02-09T00:53:06.836463255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-mqf6q,Uid:7d87966c-cf98-4792-a947-3dded052fd55,Namespace:kube-system,Attempt:1,} returns sandbox id \"13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9\"" Feb 9 00:53:06.837217 kubelet[1427]: E0209 00:53:06.837196 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:06.929353 systemd[1]: run-netns-cni\x2dcb772e94\x2d98b3\x2dbb02\x2dd0bc\x2da6488ea9206f.mount: Deactivated successfully. Feb 9 00:53:07.078312 systemd-networkd[1014]: calif444f07b02b: Gained IPv6LL Feb 9 00:53:07.124295 kubelet[1427]: E0209 00:53:07.124257 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:07.334222 systemd-networkd[1014]: cali6ac050d244a: Gained IPv6LL Feb 9 00:53:08.124603 kubelet[1427]: E0209 00:53:08.124562 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:08.294282 systemd-networkd[1014]: caliaaa52146270: Gained IPv6LL Feb 9 00:53:09.089206 update_engine[1111]: I0209 00:53:09.089149 1111 update_attempter.cc:509] Updating boot flags... Feb 9 00:53:09.125548 kubelet[1427]: E0209 00:53:09.125515 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:09.182543 env[1119]: time="2024-02-09T00:53:09.182479179Z" level=info msg="StopPodSandbox for \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\"" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.218 [INFO][2858] k8s.go 578: Cleaning up netns ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.218 [INFO][2858] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" iface="eth0" netns="/var/run/netns/cni-365cd2b6-50cf-2364-a90f-11807fc9fb78" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.218 [INFO][2858] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" iface="eth0" netns="/var/run/netns/cni-365cd2b6-50cf-2364-a90f-11807fc9fb78" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.218 [INFO][2858] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" iface="eth0" netns="/var/run/netns/cni-365cd2b6-50cf-2364-a90f-11807fc9fb78" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.218 [INFO][2858] k8s.go 585: Releasing IP address(es) ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.218 [INFO][2858] utils.go 188: Calico CNI releasing IP address ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.232 [INFO][2866] ipam_plugin.go 415: Releasing address using handleID ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.233 [INFO][2866] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.233 [INFO][2866] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.239 [WARNING][2866] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.239 [INFO][2866] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.240 [INFO][2866] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:09.242706 env[1119]: 2024-02-09 00:53:09.241 [INFO][2858] k8s.go 591: Teardown processing complete. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:09.243128 env[1119]: time="2024-02-09T00:53:09.242824126Z" level=info msg="TearDown network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\" successfully" Feb 9 00:53:09.243128 env[1119]: time="2024-02-09T00:53:09.242848120Z" level=info msg="StopPodSandbox for \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\" returns successfully" Feb 9 00:53:09.245377 systemd[1]: run-netns-cni\x2d365cd2b6\x2d50cf\x2d2364\x2da90f\x2d11807fc9fb78.mount: Deactivated successfully. Feb 9 00:53:09.245800 env[1119]: time="2024-02-09T00:53:09.245769219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dt2tl,Uid:caff008f-3171-4225-b413-c8276d238236,Namespace:calico-system,Attempt:1,}" Feb 9 00:53:09.331240 systemd-networkd[1014]: calibe23f50c34b: Link UP Feb 9 00:53:09.333395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 00:53:09.333532 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibe23f50c34b: link becomes ready Feb 9 00:53:09.333506 systemd-networkd[1014]: calibe23f50c34b: Gained carrier Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.281 [INFO][2874] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-csi--node--driver--dt2tl-eth0 csi-node-driver- calico-system caff008f-3171-4225-b413-c8276d238236 880 0 2024-02-09 00:52:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 csi-node-driver-dt2tl eth0 default [] [] [kns.calico-system ksa.calico-system.default] calibe23f50c34b [] []}} ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Namespace="calico-system" Pod="csi-node-driver-dt2tl" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--dt2tl-" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.281 [INFO][2874] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Namespace="calico-system" Pod="csi-node-driver-dt2tl" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.301 [INFO][2887] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" HandleID="k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.309 [INFO][2887] ipam_plugin.go 268: Auto assigning IP ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" HandleID="k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012f960), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.120", "pod":"csi-node-driver-dt2tl", "timestamp":"2024-02-09 00:53:09.301227658 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.309 [INFO][2887] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.309 [INFO][2887] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.309 [INFO][2887] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.311 [INFO][2887] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.314 [INFO][2887] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.317 [INFO][2887] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.318 [INFO][2887] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.320 [INFO][2887] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.320 [INFO][2887] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.321 [INFO][2887] ipam.go 1682: Creating new handle: k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102 Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.323 [INFO][2887] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.326 [INFO][2887] ipam.go 1216: Successfully claimed IPs: [192.168.77.68/26] block=192.168.77.64/26 handle="k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.326 [INFO][2887] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.68/26] handle="k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" host="10.0.0.120" Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.326 [INFO][2887] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:09.340694 env[1119]: 2024-02-09 00:53:09.327 [INFO][2887] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.68/26] IPv6=[] ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" HandleID="k8s-pod-network.70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.341513 env[1119]: 2024-02-09 00:53:09.328 [INFO][2874] k8s.go 385: Populated endpoint ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Namespace="calico-system" Pod="csi-node-driver-dt2tl" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--dt2tl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"caff008f-3171-4225-b413-c8276d238236", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"csi-node-driver-dt2tl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calibe23f50c34b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:09.341513 env[1119]: 2024-02-09 00:53:09.329 [INFO][2874] k8s.go 386: Calico CNI using IPs: [192.168.77.68/32] ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Namespace="calico-system" Pod="csi-node-driver-dt2tl" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.341513 env[1119]: 2024-02-09 00:53:09.329 [INFO][2874] dataplane_linux.go 68: Setting the host side veth name to calibe23f50c34b ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Namespace="calico-system" Pod="csi-node-driver-dt2tl" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.341513 env[1119]: 2024-02-09 00:53:09.333 [INFO][2874] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Namespace="calico-system" Pod="csi-node-driver-dt2tl" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.341513 env[1119]: 2024-02-09 00:53:09.334 [INFO][2874] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Namespace="calico-system" Pod="csi-node-driver-dt2tl" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--dt2tl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"caff008f-3171-4225-b413-c8276d238236", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102", Pod:"csi-node-driver-dt2tl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calibe23f50c34b", MAC:"d6:a2:4a:52:23:3c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:09.341513 env[1119]: 2024-02-09 00:53:09.339 [INFO][2874] k8s.go 491: Wrote updated endpoint to datastore ContainerID="70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102" Namespace="calico-system" Pod="csi-node-driver-dt2tl" WorkloadEndpoint="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:09.349000 audit[2913]: NETFILTER_CFG table=filter:74 family=2 entries=42 op=nft_register_chain pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:09.349000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7fffaf8074f0 a2=0 a3=7fffaf8074dc items=0 ppid=2276 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:09.349000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:09.352431 env[1119]: time="2024-02-09T00:53:09.352346560Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:53:09.352431 env[1119]: time="2024-02-09T00:53:09.352379251Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:53:09.352431 env[1119]: time="2024-02-09T00:53:09.352388498Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:53:09.352707 env[1119]: time="2024-02-09T00:53:09.352659089Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102 pid=2921 runtime=io.containerd.runc.v2 Feb 9 00:53:09.363521 systemd[1]: Started cri-containerd-70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102.scope. Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit: BPF prog-id=100 op=LOAD Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:09.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643334366466383166636530396632653866356534383366646166 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:09.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643334366466383166636530396632653866356534383366646166 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.373000 audit: BPF prog-id=101 op=LOAD Feb 9 00:53:09.373000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001e1560 items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:09.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643334366466383166636530396632653866356534383366646166 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit: BPF prog-id=102 op=LOAD Feb 9 00:53:09.374000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001e15a8 items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:09.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643334366466383166636530396632653866356534383366646166 Feb 9 00:53:09.374000 audit: BPF prog-id=102 op=UNLOAD Feb 9 00:53:09.374000 audit: BPF prog-id=101 op=UNLOAD Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { perfmon } for pid=2931 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit[2931]: AVC avc: denied { bpf } for pid=2931 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:09.374000 audit: BPF prog-id=103 op=LOAD Feb 9 00:53:09.374000 audit[2931]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001e19b8 items=0 ppid=2921 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:09.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730643334366466383166636530396632653866356534383366646166 Feb 9 00:53:09.376208 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:53:09.385007 env[1119]: time="2024-02-09T00:53:09.384963230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dt2tl,Uid:caff008f-3171-4225-b413-c8276d238236,Namespace:calico-system,Attempt:1,} returns sandbox id \"70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102\"" Feb 9 00:53:10.126353 kubelet[1427]: E0209 00:53:10.126308 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:10.323337 env[1119]: time="2024-02-09T00:53:10.323292353Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:10.324987 env[1119]: time="2024-02-09T00:53:10.324959082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:10.326697 env[1119]: time="2024-02-09T00:53:10.326662469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:10.328453 env[1119]: time="2024-02-09T00:53:10.328429373Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:10.329132 env[1119]: time="2024-02-09T00:53:10.329104855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 00:53:10.330196 env[1119]: time="2024-02-09T00:53:10.329859464Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 00:53:10.334167 env[1119]: time="2024-02-09T00:53:10.334133775Z" level=info msg="CreateContainer within sandbox \"607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 00:53:10.345670 env[1119]: time="2024-02-09T00:53:10.345610184Z" level=info msg="CreateContainer within sandbox \"607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"63eb52e960630000e8b5fbddae6e4f542361868565374f9676eb3bcade6a33ed\"" Feb 9 00:53:10.346267 env[1119]: time="2024-02-09T00:53:10.346215386Z" level=info msg="StartContainer for \"63eb52e960630000e8b5fbddae6e4f542361868565374f9676eb3bcade6a33ed\"" Feb 9 00:53:10.360060 systemd[1]: Started cri-containerd-63eb52e960630000e8b5fbddae6e4f542361868565374f9676eb3bcade6a33ed.scope. Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.370000 audit: BPF prog-id=104 op=LOAD Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2621 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:10.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633656235326539363036333030303065386235666264646165366534 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2621 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:10.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633656235326539363036333030303065386235666264646165366534 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit: BPF prog-id=105 op=LOAD Feb 9 00:53:10.371000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000309880 items=0 ppid=2621 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:10.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633656235326539363036333030303065386235666264646165366534 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit: BPF prog-id=106 op=LOAD Feb 9 00:53:10.371000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003098c8 items=0 ppid=2621 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:10.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633656235326539363036333030303065386235666264646165366534 Feb 9 00:53:10.371000 audit: BPF prog-id=106 op=UNLOAD Feb 9 00:53:10.371000 audit: BPF prog-id=105 op=UNLOAD Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:10.371000 audit: BPF prog-id=107 op=LOAD Feb 9 00:53:10.371000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000309cd8 items=0 ppid=2621 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:10.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633656235326539363036333030303065386235666264646165366534 Feb 9 00:53:10.394866 env[1119]: time="2024-02-09T00:53:10.394786430Z" level=info msg="StartContainer for \"63eb52e960630000e8b5fbddae6e4f542361868565374f9676eb3bcade6a33ed\" returns successfully" Feb 9 00:53:10.662181 systemd-networkd[1014]: calibe23f50c34b: Gained IPv6LL Feb 9 00:53:11.127217 kubelet[1427]: E0209 00:53:11.127184 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:11.321735 kubelet[1427]: I0209 00:53:11.321706 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5f44497d7d-9tsq8" podStartSLOduration=41.09794826 podCreationTimestamp="2024-02-09 00:52:26 +0000 UTC" firstStartedPulling="2024-02-09 00:53:06.105687369 +0000 UTC m=+31.250813600" lastFinishedPulling="2024-02-09 00:53:10.329413097 +0000 UTC m=+35.474539328" observedRunningTime="2024-02-09 00:53:11.28142942 +0000 UTC m=+36.426555651" watchObservedRunningTime="2024-02-09 00:53:11.321673988 +0000 UTC m=+36.466800219" Feb 9 00:53:12.039223 env[1119]: time="2024-02-09T00:53:12.039154258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:12.040912 env[1119]: time="2024-02-09T00:53:12.040887734Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:12.042339 env[1119]: time="2024-02-09T00:53:12.042307730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:12.044402 env[1119]: time="2024-02-09T00:53:12.044357845Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:12.044654 env[1119]: time="2024-02-09T00:53:12.044616395Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 00:53:12.045222 env[1119]: time="2024-02-09T00:53:12.045180221Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 00:53:12.046740 env[1119]: time="2024-02-09T00:53:12.046716713Z" level=info msg="CreateContainer within sandbox \"9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 00:53:12.058166 env[1119]: time="2024-02-09T00:53:12.058121349Z" level=info msg="CreateContainer within sandbox \"9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3261f8a40862164092bbd66723ee49053d4eb4ae6ff03b5a40a66edd10b3bfa5\"" Feb 9 00:53:12.058746 env[1119]: time="2024-02-09T00:53:12.058701705Z" level=info msg="StartContainer for \"3261f8a40862164092bbd66723ee49053d4eb4ae6ff03b5a40a66edd10b3bfa5\"" Feb 9 00:53:12.074530 systemd[1]: Started cri-containerd-3261f8a40862164092bbd66723ee49053d4eb4ae6ff03b5a40a66edd10b3bfa5.scope. Feb 9 00:53:12.085101 kernel: kauditd_printk_skb: 287 callbacks suppressed Feb 9 00:53:12.085217 kernel: audit: type=1400 audit(1707439992.082:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.088541 kernel: audit: type=1400 audit(1707439992.082:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.088583 kernel: audit: type=1400 audit(1707439992.082:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.092480 kernel: audit: type=1400 audit(1707439992.082:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.092531 kernel: audit: type=1400 audit(1707439992.082:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.094452 kernel: audit: type=1400 audit(1707439992.082:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.098395 kernel: audit: type=1400 audit(1707439992.082:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.098444 kernel: audit: type=1400 audit(1707439992.082:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.102280 kernel: audit: type=1400 audit(1707439992.082:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.102327 kernel: audit: type=1400 audit(1707439992.083:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.083000 audit: BPF prog-id=108 op=LOAD Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2676 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363166386134303836323136343039326262643636373233656534 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2676 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363166386134303836323136343039326262643636373233656534 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.086000 audit: BPF prog-id=109 op=LOAD Feb 9 00:53:12.086000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a0370 items=0 ppid=2676 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363166386134303836323136343039326262643636373233656534 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.089000 audit: BPF prog-id=110 op=LOAD Feb 9 00:53:12.089000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a03b8 items=0 ppid=2676 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363166386134303836323136343039326262643636373233656534 Feb 9 00:53:12.093000 audit: BPF prog-id=110 op=UNLOAD Feb 9 00:53:12.093000 audit: BPF prog-id=109 op=UNLOAD Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { perfmon } for pid=3030 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit[3030]: AVC avc: denied { bpf } for pid=3030 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.093000 audit: BPF prog-id=111 op=LOAD Feb 9 00:53:12.093000 audit[3030]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a07c8 items=0 ppid=2676 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332363166386134303836323136343039326262643636373233656534 Feb 9 00:53:12.115164 env[1119]: time="2024-02-09T00:53:12.115121063Z" level=info msg="StartContainer for \"3261f8a40862164092bbd66723ee49053d4eb4ae6ff03b5a40a66edd10b3bfa5\" returns successfully" Feb 9 00:53:12.127825 kubelet[1427]: E0209 00:53:12.127802 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:12.176201 env[1119]: time="2024-02-09T00:53:12.176151570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:12.177763 env[1119]: time="2024-02-09T00:53:12.177738274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:12.178893 env[1119]: time="2024-02-09T00:53:12.178854346Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:12.180116 env[1119]: time="2024-02-09T00:53:12.180091722Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:12.180488 env[1119]: time="2024-02-09T00:53:12.180457480Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 00:53:12.181162 env[1119]: time="2024-02-09T00:53:12.181052936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 00:53:12.181977 env[1119]: time="2024-02-09T00:53:12.181952576Z" level=info msg="CreateContainer within sandbox \"13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 00:53:12.193158 env[1119]: time="2024-02-09T00:53:12.193103420Z" level=info msg="CreateContainer within sandbox \"13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"176f45239f0ab7d8ad335c0fe35c7e45047f9c6b92243582c83077299ff6e6ae\"" Feb 9 00:53:12.193565 env[1119]: time="2024-02-09T00:53:12.193472385Z" level=info msg="StartContainer for \"176f45239f0ab7d8ad335c0fe35c7e45047f9c6b92243582c83077299ff6e6ae\"" Feb 9 00:53:12.206619 systemd[1]: Started cri-containerd-176f45239f0ab7d8ad335c0fe35c7e45047f9c6b92243582c83077299ff6e6ae.scope. Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit: BPF prog-id=112 op=LOAD Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2790 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137366634353233396630616237643861643333356330666533356337 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2790 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137366634353233396630616237643861643333356330666533356337 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.216000 audit: BPF prog-id=113 op=LOAD Feb 9 00:53:12.216000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b40a0 items=0 ppid=2790 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137366634353233396630616237643861643333356330666533356337 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit: BPF prog-id=114 op=LOAD Feb 9 00:53:12.217000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b40e8 items=0 ppid=2790 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137366634353233396630616237643861643333356330666533356337 Feb 9 00:53:12.217000 audit: BPF prog-id=114 op=UNLOAD Feb 9 00:53:12.217000 audit: BPF prog-id=113 op=UNLOAD Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { perfmon } for pid=3067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit[3067]: AVC avc: denied { bpf } for pid=3067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:12.217000 audit: BPF prog-id=115 op=LOAD Feb 9 00:53:12.217000 audit[3067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b44f8 items=0 ppid=2790 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137366634353233396630616237643861643333356330666533356337 Feb 9 00:53:12.230343 env[1119]: time="2024-02-09T00:53:12.230309401Z" level=info msg="StartContainer for \"176f45239f0ab7d8ad335c0fe35c7e45047f9c6b92243582c83077299ff6e6ae\" returns successfully" Feb 9 00:53:12.274568 kubelet[1427]: E0209 00:53:12.274491 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:12.276140 kubelet[1427]: E0209 00:53:12.276121 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:12.286876 kubelet[1427]: I0209 00:53:12.286849 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-7r5tn" podStartSLOduration=46.476669755 podCreationTimestamp="2024-02-09 00:52:20 +0000 UTC" firstStartedPulling="2024-02-09 00:53:06.234793359 +0000 UTC m=+31.379919590" lastFinishedPulling="2024-02-09 00:53:12.044937721 +0000 UTC m=+37.190063952" observedRunningTime="2024-02-09 00:53:12.286378398 +0000 UTC m=+37.431504629" watchObservedRunningTime="2024-02-09 00:53:12.286814117 +0000 UTC m=+37.431940348" Feb 9 00:53:12.296000 audit[3101]: NETFILTER_CFG table=filter:75 family=2 entries=14 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:12.296000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcef1f7b80 a2=0 a3=7ffcef1f7b6c items=0 ppid=1643 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:12.302795 kubelet[1427]: I0209 00:53:12.302754 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-mqf6q" podStartSLOduration=46.959853269999996 podCreationTimestamp="2024-02-09 00:52:20 +0000 UTC" firstStartedPulling="2024-02-09 00:53:06.837899247 +0000 UTC m=+31.983025478" lastFinishedPulling="2024-02-09 00:53:12.180748551 +0000 UTC m=+37.325874772" observedRunningTime="2024-02-09 00:53:12.302332738 +0000 UTC m=+37.447458969" watchObservedRunningTime="2024-02-09 00:53:12.302702564 +0000 UTC m=+37.447828795" Feb 9 00:53:12.296000 audit[3101]: NETFILTER_CFG table=nat:76 family=2 entries=14 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:12.296000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffcef1f7b80 a2=0 a3=31030 items=0 ppid=1643 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:12.315000 audit[3103]: NETFILTER_CFG table=filter:77 family=2 entries=11 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:12.315000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcfde9a700 a2=0 a3=7ffcfde9a6ec items=0 ppid=1643 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:12.317000 audit[3103]: NETFILTER_CFG table=nat:78 family=2 entries=35 op=nft_register_chain pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:12.317000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffcfde9a700 a2=0 a3=7ffcfde9a6ec items=0 ppid=1643 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:12.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:12.634403 kubelet[1427]: E0209 00:53:12.634367 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:13.128235 kubelet[1427]: E0209 00:53:13.128199 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:13.182216 env[1119]: time="2024-02-09T00:53:13.182183050Z" level=info msg="StopPodSandbox for \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\"" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.213 [INFO][3146] k8s.go 578: Cleaning up netns ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.213 [INFO][3146] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" iface="eth0" netns="/var/run/netns/cni-7b5aaa3e-6781-aa1d-b2e1-351b88b22ef1" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.213 [INFO][3146] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" iface="eth0" netns="/var/run/netns/cni-7b5aaa3e-6781-aa1d-b2e1-351b88b22ef1" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.213 [INFO][3146] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" iface="eth0" netns="/var/run/netns/cni-7b5aaa3e-6781-aa1d-b2e1-351b88b22ef1" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.213 [INFO][3146] k8s.go 585: Releasing IP address(es) ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.213 [INFO][3146] utils.go 188: Calico CNI releasing IP address ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.226 [INFO][3153] ipam_plugin.go 415: Releasing address using handleID ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.227 [INFO][3153] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.227 [INFO][3153] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.233 [WARNING][3153] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.233 [INFO][3153] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.234 [INFO][3153] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:13.236867 env[1119]: 2024-02-09 00:53:13.235 [INFO][3146] k8s.go 591: Teardown processing complete. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:13.237426 env[1119]: time="2024-02-09T00:53:13.237014667Z" level=info msg="TearDown network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\" successfully" Feb 9 00:53:13.237426 env[1119]: time="2024-02-09T00:53:13.237040184Z" level=info msg="StopPodSandbox for \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\" returns successfully" Feb 9 00:53:13.238502 systemd[1]: run-netns-cni\x2d7b5aaa3e\x2d6781\x2daa1d\x2db2e1\x2d351b88b22ef1.mount: Deactivated successfully. Feb 9 00:53:13.239172 env[1119]: time="2024-02-09T00:53:13.239139143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-255gl,Uid:1e2ff3da-736b-4b4f-92fd-16822f1ecfce,Namespace:default,Attempt:1,}" Feb 9 00:53:13.278271 kubelet[1427]: E0209 00:53:13.277977 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:13.278271 kubelet[1427]: E0209 00:53:13.278126 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:13.329125 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 00:53:13.329254 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali073aa05e575: link becomes ready Feb 9 00:53:13.327449 systemd-networkd[1014]: cali073aa05e575: Link UP Feb 9 00:53:13.329619 systemd-networkd[1014]: cali073aa05e575: Gained carrier Feb 9 00:53:13.337000 audit[3185]: NETFILTER_CFG table=filter:79 family=2 entries=8 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:13.337000 audit[3185]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc0dba1760 a2=0 a3=7ffc0dba174c items=0 ppid=1643 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:13.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.274 [INFO][3162] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0 nginx-deployment-6d5f899847- default 1e2ff3da-736b-4b4f-92fd-16822f1ecfce 946 0 2024-02-09 00:52:58 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 nginx-deployment-6d5f899847-255gl eth0 default [] [] [kns.default ksa.default.default] cali073aa05e575 [] []}} ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Namespace="default" Pod="nginx-deployment-6d5f899847-255gl" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.274 [INFO][3162] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Namespace="default" Pod="nginx-deployment-6d5f899847-255gl" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.294 [INFO][3175] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" HandleID="k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.303 [INFO][3175] ipam_plugin.go 268: Auto assigning IP ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" HandleID="k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029fb70), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"nginx-deployment-6d5f899847-255gl", "timestamp":"2024-02-09 00:53:13.294289081 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.304 [INFO][3175] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.304 [INFO][3175] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.304 [INFO][3175] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.305 [INFO][3175] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.308 [INFO][3175] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.312 [INFO][3175] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.313 [INFO][3175] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.315 [INFO][3175] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.315 [INFO][3175] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.316 [INFO][3175] ipam.go 1682: Creating new handle: k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6 Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.319 [INFO][3175] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.322 [INFO][3175] ipam.go 1216: Successfully claimed IPs: [192.168.77.69/26] block=192.168.77.64/26 handle="k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.323 [INFO][3175] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.69/26] handle="k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" host="10.0.0.120" Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.323 [INFO][3175] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:13.343432 env[1119]: 2024-02-09 00:53:13.323 [INFO][3175] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.69/26] IPv6=[] ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" HandleID="k8s-pod-network.0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.343966 env[1119]: 2024-02-09 00:53:13.325 [INFO][3162] k8s.go 385: Populated endpoint ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Namespace="default" Pod="nginx-deployment-6d5f899847-255gl" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"1e2ff3da-736b-4b4f-92fd-16822f1ecfce", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"nginx-deployment-6d5f899847-255gl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali073aa05e575", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:13.343966 env[1119]: 2024-02-09 00:53:13.325 [INFO][3162] k8s.go 386: Calico CNI using IPs: [192.168.77.69/32] ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Namespace="default" Pod="nginx-deployment-6d5f899847-255gl" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.343966 env[1119]: 2024-02-09 00:53:13.325 [INFO][3162] dataplane_linux.go 68: Setting the host side veth name to cali073aa05e575 ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Namespace="default" Pod="nginx-deployment-6d5f899847-255gl" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.343966 env[1119]: 2024-02-09 00:53:13.329 [INFO][3162] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Namespace="default" Pod="nginx-deployment-6d5f899847-255gl" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.343966 env[1119]: 2024-02-09 00:53:13.329 [INFO][3162] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Namespace="default" Pod="nginx-deployment-6d5f899847-255gl" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"1e2ff3da-736b-4b4f-92fd-16822f1ecfce", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6", Pod:"nginx-deployment-6d5f899847-255gl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali073aa05e575", MAC:"b6:fb:56:45:8d:86", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:13.343966 env[1119]: 2024-02-09 00:53:13.337 [INFO][3162] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6" Namespace="default" Pod="nginx-deployment-6d5f899847-255gl" WorkloadEndpoint="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:13.341000 audit[3185]: NETFILTER_CFG table=nat:80 family=2 entries=56 op=nft_register_chain pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:13.341000 audit[3185]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffc0dba1760 a2=0 a3=7ffc0dba174c items=0 ppid=1643 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:13.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:13.350000 audit[3200]: NETFILTER_CFG table=filter:81 family=2 entries=52 op=nft_register_chain pid=3200 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:13.350000 audit[3200]: SYSCALL arch=c000003e syscall=46 success=yes exit=24628 a0=3 a1=7ffdb5fa8ea0 a2=0 a3=7ffdb5fa8e8c items=0 ppid=2276 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:13.350000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:13.354902 env[1119]: time="2024-02-09T00:53:13.354837925Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:53:13.354902 env[1119]: time="2024-02-09T00:53:13.354883139Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:53:13.354902 env[1119]: time="2024-02-09T00:53:13.354896444Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:53:13.355174 env[1119]: time="2024-02-09T00:53:13.355055178Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6 pid=3208 runtime=io.containerd.runc.v2 Feb 9 00:53:13.366590 systemd[1]: Started cri-containerd-0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6.scope. Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.372000 audit: BPF prog-id=116 op=LOAD Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3208 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:13.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343231373464626239353165366465663138633763623061356439 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3208 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:13.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343231373464626239353165366465663138633763623061356439 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit: BPF prog-id=117 op=LOAD Feb 9 00:53:13.373000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002983e0 items=0 ppid=3208 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:13.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343231373464626239353165366465663138633763623061356439 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit: BPF prog-id=118 op=LOAD Feb 9 00:53:13.373000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000298428 items=0 ppid=3208 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:13.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343231373464626239353165366465663138633763623061356439 Feb 9 00:53:13.373000 audit: BPF prog-id=118 op=UNLOAD Feb 9 00:53:13.373000 audit: BPF prog-id=117 op=UNLOAD Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:13.373000 audit: BPF prog-id=119 op=LOAD Feb 9 00:53:13.373000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000298838 items=0 ppid=3208 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:13.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343231373464626239353165366465663138633763623061356439 Feb 9 00:53:13.375055 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:53:13.395405 env[1119]: time="2024-02-09T00:53:13.395313692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-255gl,Uid:1e2ff3da-736b-4b4f-92fd-16822f1ecfce,Namespace:default,Attempt:1,} returns sandbox id \"0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6\"" Feb 9 00:53:13.660484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4148969097.mount: Deactivated successfully. Feb 9 00:53:13.986031 env[1119]: time="2024-02-09T00:53:13.985836953Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:13.987847 env[1119]: time="2024-02-09T00:53:13.987797765Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:13.989701 env[1119]: time="2024-02-09T00:53:13.989672917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:13.990940 env[1119]: time="2024-02-09T00:53:13.990886862Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:13.991479 env[1119]: time="2024-02-09T00:53:13.991408851Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 00:53:13.992572 env[1119]: time="2024-02-09T00:53:13.992518090Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 00:53:13.993197 env[1119]: time="2024-02-09T00:53:13.993164191Z" level=info msg="CreateContainer within sandbox \"70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 00:53:14.005931 env[1119]: time="2024-02-09T00:53:14.005879289Z" level=info msg="CreateContainer within sandbox \"70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f492006f46ba019faad96f5ed52c0b60e6b8e5954efbc47f82058cec7ba4de50\"" Feb 9 00:53:14.006370 env[1119]: time="2024-02-09T00:53:14.006350845Z" level=info msg="StartContainer for \"f492006f46ba019faad96f5ed52c0b60e6b8e5954efbc47f82058cec7ba4de50\"" Feb 9 00:53:14.020812 systemd[1]: Started cri-containerd-f492006f46ba019faad96f5ed52c0b60e6b8e5954efbc47f82058cec7ba4de50.scope. Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2921 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:14.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393230303666343662613031396661616439366635656435326330 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit: BPF prog-id=120 op=LOAD Feb 9 00:53:14.035000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028a290 items=0 ppid=2921 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:14.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393230303666343662613031396661616439366635656435326330 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit: BPF prog-id=121 op=LOAD Feb 9 00:53:14.035000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028a2d8 items=0 ppid=2921 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:14.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393230303666343662613031396661616439366635656435326330 Feb 9 00:53:14.035000 audit: BPF prog-id=121 op=UNLOAD Feb 9 00:53:14.035000 audit: BPF prog-id=120 op=UNLOAD Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:14.035000 audit: BPF prog-id=122 op=LOAD Feb 9 00:53:14.035000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028a368 items=0 ppid=2921 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:14.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634393230303666343662613031396661616439366635656435326330 Feb 9 00:53:14.052671 env[1119]: time="2024-02-09T00:53:14.052632756Z" level=info msg="StartContainer for \"f492006f46ba019faad96f5ed52c0b60e6b8e5954efbc47f82058cec7ba4de50\" returns successfully" Feb 9 00:53:14.128554 kubelet[1427]: E0209 00:53:14.128514 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:14.282732 kubelet[1427]: E0209 00:53:14.282654 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:14.282876 kubelet[1427]: E0209 00:53:14.282850 1427 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 00:53:15.014270 systemd-networkd[1014]: cali073aa05e575: Gained IPv6LL Feb 9 00:53:15.106086 kubelet[1427]: E0209 00:53:15.106005 1427 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:15.129676 kubelet[1427]: E0209 00:53:15.129625 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:16.130126 kubelet[1427]: E0209 00:53:16.130061 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:16.793557 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2681878736.mount: Deactivated successfully. Feb 9 00:53:17.130637 kubelet[1427]: E0209 00:53:17.130578 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:18.131021 kubelet[1427]: E0209 00:53:18.130976 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:18.134311 env[1119]: time="2024-02-09T00:53:18.134249594Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:18.135999 env[1119]: time="2024-02-09T00:53:18.135959669Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:18.137483 env[1119]: time="2024-02-09T00:53:18.137450193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:18.139122 env[1119]: time="2024-02-09T00:53:18.139060643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:18.139752 env[1119]: time="2024-02-09T00:53:18.139719660Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 00:53:18.140422 env[1119]: time="2024-02-09T00:53:18.140323554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 00:53:18.141572 env[1119]: time="2024-02-09T00:53:18.141543185Z" level=info msg="CreateContainer within sandbox \"0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 00:53:18.153145 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount455962419.mount: Deactivated successfully. Feb 9 00:53:18.153940 env[1119]: time="2024-02-09T00:53:18.153880959Z" level=info msg="CreateContainer within sandbox \"0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c78beeab96949ce24381ae5b7265599067dc502dda326029e868ba5a2841ff38\"" Feb 9 00:53:18.154422 env[1119]: time="2024-02-09T00:53:18.154395917Z" level=info msg="StartContainer for \"c78beeab96949ce24381ae5b7265599067dc502dda326029e868ba5a2841ff38\"" Feb 9 00:53:18.170843 systemd[1]: run-containerd-runc-k8s.io-c78beeab96949ce24381ae5b7265599067dc502dda326029e868ba5a2841ff38-runc.qH61gm.mount: Deactivated successfully. Feb 9 00:53:18.173277 systemd[1]: Started cri-containerd-c78beeab96949ce24381ae5b7265599067dc502dda326029e868ba5a2841ff38.scope. Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185014 kernel: kauditd_printk_skb: 225 callbacks suppressed Feb 9 00:53:18.185085 kernel: audit: type=1400 audit(1707439998.181:853): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185110 kernel: audit: type=1400 audit(1707439998.181:854): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.189396 kernel: audit: type=1400 audit(1707439998.181:855): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.189541 kernel: audit: type=1400 audit(1707439998.181:856): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.195421 kernel: audit: type=1400 audit(1707439998.181:857): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.195562 kernel: audit: type=1400 audit(1707439998.181:858): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.197764 kernel: audit: type=1400 audit(1707439998.181:859): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.199868 kernel: audit: type=1400 audit(1707439998.181:860): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.199918 kernel: audit: type=1400 audit(1707439998.181:861): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.201820 kernel: audit: type=1400 audit(1707439998.183:862): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.183000 audit: BPF prog-id=123 op=LOAD Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3208 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:18.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386265656162393639343963653234333831616535623732363535 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3208 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:18.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386265656162393639343963653234333831616535623732363535 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.184000 audit: BPF prog-id=124 op=LOAD Feb 9 00:53:18.184000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000298e60 items=0 ppid=3208 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:18.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386265656162393639343963653234333831616535623732363535 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.185000 audit: BPF prog-id=125 op=LOAD Feb 9 00:53:18.185000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000298ea8 items=0 ppid=3208 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:18.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386265656162393639343963653234333831616535623732363535 Feb 9 00:53:18.190000 audit: BPF prog-id=125 op=UNLOAD Feb 9 00:53:18.190000 audit: BPF prog-id=124 op=UNLOAD Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:18.190000 audit: BPF prog-id=126 op=LOAD Feb 9 00:53:18.190000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002992b8 items=0 ppid=3208 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:18.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386265656162393639343963653234333831616535623732363535 Feb 9 00:53:18.217164 env[1119]: time="2024-02-09T00:53:18.217037538Z" level=info msg="StartContainer for \"c78beeab96949ce24381ae5b7265599067dc502dda326029e868ba5a2841ff38\" returns successfully" Feb 9 00:53:18.301552 kubelet[1427]: I0209 00:53:18.301508 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-255gl" podStartSLOduration=15.557590251 podCreationTimestamp="2024-02-09 00:52:58 +0000 UTC" firstStartedPulling="2024-02-09 00:53:13.39617963 +0000 UTC m=+38.541305851" lastFinishedPulling="2024-02-09 00:53:18.140056828 +0000 UTC m=+43.285183059" observedRunningTime="2024-02-09 00:53:18.301357504 +0000 UTC m=+43.446483735" watchObservedRunningTime="2024-02-09 00:53:18.301467459 +0000 UTC m=+43.446593740" Feb 9 00:53:19.131194 kubelet[1427]: E0209 00:53:19.131137 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:20.043000 audit[3338]: NETFILTER_CFG table=filter:82 family=2 entries=20 op=nft_register_rule pid=3338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:20.043000 audit[3338]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fff83ac64e0 a2=0 a3=7fff83ac64cc items=0 ppid=1643 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:20.044000 audit[3338]: NETFILTER_CFG table=nat:83 family=2 entries=20 op=nft_register_rule pid=3338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:20.044000 audit[3338]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff83ac64e0 a2=0 a3=31030 items=0 ppid=1643 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:20.062000 audit[3340]: NETFILTER_CFG table=filter:84 family=2 entries=32 op=nft_register_rule pid=3340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:20.062000 audit[3340]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd3ee08fc0 a2=0 a3=7ffd3ee08fac items=0 ppid=1643 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:20.062000 audit[3340]: NETFILTER_CFG table=nat:85 family=2 entries=20 op=nft_register_rule pid=3340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:20.062000 audit[3340]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd3ee08fc0 a2=0 a3=31030 items=0 ppid=1643 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:20.072288 env[1119]: time="2024-02-09T00:53:20.072249523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:20.082304 env[1119]: time="2024-02-09T00:53:20.082253697Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:20.131875 kubelet[1427]: E0209 00:53:20.131829 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:20.139123 env[1119]: time="2024-02-09T00:53:20.139086109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:20.154086 env[1119]: time="2024-02-09T00:53:20.154036761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:20.154442 env[1119]: time="2024-02-09T00:53:20.154390981Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 00:53:20.156084 env[1119]: time="2024-02-09T00:53:20.156025879Z" level=info msg="CreateContainer within sandbox \"70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 00:53:20.161489 kubelet[1427]: I0209 00:53:20.161455 1427 topology_manager.go:215] "Topology Admit Handler" podUID="7bc7463a-d06a-4ed7-b9cc-ad819e230700" podNamespace="default" podName="nfs-server-provisioner-0" Feb 9 00:53:20.167675 systemd[1]: Created slice kubepods-besteffort-pod7bc7463a_d06a_4ed7_b9cc_ad819e230700.slice. Feb 9 00:53:20.171928 env[1119]: time="2024-02-09T00:53:20.171845379Z" level=info msg="CreateContainer within sandbox \"70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b1ba40d041f333bff19e7df65d156c977d6b3e9e1de0fcf9ad20009f03b2bd5e\"" Feb 9 00:53:20.172368 env[1119]: time="2024-02-09T00:53:20.172344079Z" level=info msg="StartContainer for \"b1ba40d041f333bff19e7df65d156c977d6b3e9e1de0fcf9ad20009f03b2bd5e\"" Feb 9 00:53:20.188717 systemd[1]: Started cri-containerd-b1ba40d041f333bff19e7df65d156c977d6b3e9e1de0fcf9ad20009f03b2bd5e.scope. Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2921 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231626134306430343166333333626666313965376466363564313536 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.199000 audit: BPF prog-id=127 op=LOAD Feb 9 00:53:20.199000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000296a10 items=0 ppid=2921 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231626134306430343166333333626666313965376466363564313536 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit: BPF prog-id=128 op=LOAD Feb 9 00:53:20.200000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000296a58 items=0 ppid=2921 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231626134306430343166333333626666313965376466363564313536 Feb 9 00:53:20.200000 audit: BPF prog-id=128 op=UNLOAD Feb 9 00:53:20.200000 audit: BPF prog-id=127 op=UNLOAD Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.200000 audit: BPF prog-id=129 op=LOAD Feb 9 00:53:20.200000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000296ae8 items=0 ppid=2921 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231626134306430343166333333626666313965376466363564313536 Feb 9 00:53:20.214403 env[1119]: time="2024-02-09T00:53:20.214344961Z" level=info msg="StartContainer for \"b1ba40d041f333bff19e7df65d156c977d6b3e9e1de0fcf9ad20009f03b2bd5e\" returns successfully" Feb 9 00:53:20.248960 kubelet[1427]: I0209 00:53:20.248933 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/7bc7463a-d06a-4ed7-b9cc-ad819e230700-data\") pod \"nfs-server-provisioner-0\" (UID: \"7bc7463a-d06a-4ed7-b9cc-ad819e230700\") " pod="default/nfs-server-provisioner-0" Feb 9 00:53:20.249115 kubelet[1427]: I0209 00:53:20.248973 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-74bwr\" (UniqueName: \"kubernetes.io/projected/7bc7463a-d06a-4ed7-b9cc-ad819e230700-kube-api-access-74bwr\") pod \"nfs-server-provisioner-0\" (UID: \"7bc7463a-d06a-4ed7-b9cc-ad819e230700\") " pod="default/nfs-server-provisioner-0" Feb 9 00:53:20.306580 kubelet[1427]: I0209 00:53:20.306468 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-dt2tl" podStartSLOduration=33.538021575 podCreationTimestamp="2024-02-09 00:52:36 +0000 UTC" firstStartedPulling="2024-02-09 00:53:09.38620001 +0000 UTC m=+34.531326241" lastFinishedPulling="2024-02-09 00:53:20.15459956 +0000 UTC m=+45.299725781" observedRunningTime="2024-02-09 00:53:20.305940869 +0000 UTC m=+45.451067100" watchObservedRunningTime="2024-02-09 00:53:20.306421115 +0000 UTC m=+45.451547336" Feb 9 00:53:20.470854 env[1119]: time="2024-02-09T00:53:20.470809408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7bc7463a-d06a-4ed7-b9cc-ad819e230700,Namespace:default,Attempt:0,}" Feb 9 00:53:20.562395 systemd-networkd[1014]: cali60e51b789ff: Link UP Feb 9 00:53:20.563681 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 00:53:20.563773 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 00:53:20.563916 systemd-networkd[1014]: cali60e51b789ff: Gained carrier Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.507 [INFO][3379] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 7bc7463a-d06a-4ed7-b9cc-ad819e230700 1006 0 2024-02-09 00:53:20 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.120 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.507 [INFO][3379] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.530 [INFO][3394] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" HandleID="k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.539 [INFO][3394] ipam_plugin.go 268: Auto assigning IP ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" HandleID="k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000519a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 00:53:20.530026585 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.539 [INFO][3394] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.539 [INFO][3394] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.539 [INFO][3394] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.540 [INFO][3394] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.544 [INFO][3394] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.548 [INFO][3394] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.549 [INFO][3394] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.551 [INFO][3394] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.551 [INFO][3394] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.552 [INFO][3394] ipam.go 1682: Creating new handle: k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1 Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.555 [INFO][3394] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.559 [INFO][3394] ipam.go 1216: Successfully claimed IPs: [192.168.77.70/26] block=192.168.77.64/26 handle="k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.559 [INFO][3394] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.70/26] handle="k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" host="10.0.0.120" Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.559 [INFO][3394] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:20.574584 env[1119]: 2024-02-09 00:53:20.559 [INFO][3394] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.70/26] IPv6=[] ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" HandleID="k8s-pod-network.17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Workload="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 9 00:53:20.575183 env[1119]: 2024-02-09 00:53:20.560 [INFO][3379] k8s.go 385: Populated endpoint ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7bc7463a-d06a-4ed7-b9cc-ad819e230700", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 53, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.77.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:20.575183 env[1119]: 2024-02-09 00:53:20.560 [INFO][3379] k8s.go 386: Calico CNI using IPs: [192.168.77.70/32] ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 9 00:53:20.575183 env[1119]: 2024-02-09 00:53:20.560 [INFO][3379] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 9 00:53:20.575183 env[1119]: 2024-02-09 00:53:20.563 [INFO][3379] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 9 00:53:20.575324 env[1119]: 2024-02-09 00:53:20.564 [INFO][3379] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7bc7463a-d06a-4ed7-b9cc-ad819e230700", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 53, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.77.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"b2:d8:c0:ab:ec:b9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:20.575324 env[1119]: 2024-02-09 00:53:20.570 [INFO][3379] k8s.go 491: Wrote updated endpoint to datastore ContainerID="17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.120-k8s-nfs--server--provisioner--0-eth0" Feb 9 00:53:20.582000 audit[3418]: NETFILTER_CFG table=filter:86 family=2 entries=56 op=nft_register_chain pid=3418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:20.582000 audit[3418]: SYSCALL arch=c000003e syscall=46 success=yes exit=25916 a0=3 a1=7ffe2ab5f0a0 a2=0 a3=7ffe2ab5f08c items=0 ppid=2276 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:20.586378 env[1119]: time="2024-02-09T00:53:20.586303272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:53:20.586378 env[1119]: time="2024-02-09T00:53:20.586351953Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:53:20.586378 env[1119]: time="2024-02-09T00:53:20.586362222Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:53:20.586551 env[1119]: time="2024-02-09T00:53:20.586508986Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1 pid=3427 runtime=io.containerd.runc.v2 Feb 9 00:53:20.597083 systemd[1]: Started cri-containerd-17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1.scope. Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.604000 audit: BPF prog-id=130 op=LOAD Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3427 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653930643238306534636338636533666632633264666438663630 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3427 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653930643238306534636338636533666632633264666438663630 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit: BPF prog-id=131 op=LOAD Feb 9 00:53:20.605000 audit[3437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00028e9c0 items=0 ppid=3427 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653930643238306534636338636533666632633264666438663630 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit: BPF prog-id=132 op=LOAD Feb 9 00:53:20.605000 audit[3437]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00028ea08 items=0 ppid=3427 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653930643238306534636338636533666632633264666438663630 Feb 9 00:53:20.605000 audit: BPF prog-id=132 op=UNLOAD Feb 9 00:53:20.605000 audit: BPF prog-id=131 op=UNLOAD Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { perfmon } for pid=3437 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit[3437]: AVC avc: denied { bpf } for pid=3437 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:20.605000 audit: BPF prog-id=133 op=LOAD Feb 9 00:53:20.605000 audit[3437]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00028ee18 items=0 ppid=3427 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:20.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653930643238306534636338636533666632633264666438663630 Feb 9 00:53:20.607045 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:53:20.627487 env[1119]: time="2024-02-09T00:53:20.627442739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7bc7463a-d06a-4ed7-b9cc-ad819e230700,Namespace:default,Attempt:0,} returns sandbox id \"17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1\"" Feb 9 00:53:20.628936 env[1119]: time="2024-02-09T00:53:20.628902310Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 00:53:21.132602 kubelet[1427]: E0209 00:53:21.132554 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:21.180821 kubelet[1427]: I0209 00:53:21.180782 1427 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 00:53:21.182131 kubelet[1427]: I0209 00:53:21.182116 1427 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 00:53:22.132875 kubelet[1427]: E0209 00:53:22.132840 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:22.374759 systemd-networkd[1014]: cali60e51b789ff: Gained IPv6LL Feb 9 00:53:23.035564 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3515855593.mount: Deactivated successfully. Feb 9 00:53:23.133949 kubelet[1427]: E0209 00:53:23.133908 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:24.134644 kubelet[1427]: E0209 00:53:24.134593 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:25.135633 kubelet[1427]: E0209 00:53:25.135588 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:25.145231 env[1119]: time="2024-02-09T00:53:25.145183507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:25.148601 env[1119]: time="2024-02-09T00:53:25.148572243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:25.151027 env[1119]: time="2024-02-09T00:53:25.150962645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:25.152799 env[1119]: time="2024-02-09T00:53:25.152777824Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:25.153413 env[1119]: time="2024-02-09T00:53:25.153380799Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 00:53:25.155029 env[1119]: time="2024-02-09T00:53:25.155006334Z" level=info msg="CreateContainer within sandbox \"17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 00:53:25.163882 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4276685844.mount: Deactivated successfully. Feb 9 00:53:25.167879 env[1119]: time="2024-02-09T00:53:25.167845452Z" level=info msg="CreateContainer within sandbox \"17e90d280e4cc8ce3ff2c2dfd8f60ea06830ef20956c165bd53dea89ae0152c1\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"aaccc3803e326ac205a65e221f8d0912ed99e5df9e300b87a01f44256c250415\"" Feb 9 00:53:25.168194 env[1119]: time="2024-02-09T00:53:25.168172422Z" level=info msg="StartContainer for \"aaccc3803e326ac205a65e221f8d0912ed99e5df9e300b87a01f44256c250415\"" Feb 9 00:53:25.183781 systemd[1]: Started cri-containerd-aaccc3803e326ac205a65e221f8d0912ed99e5df9e300b87a01f44256c250415.scope. Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.194344 kernel: kauditd_printk_skb: 162 callbacks suppressed Feb 9 00:53:25.194401 kernel: audit: type=1400 audit(1707440005.192:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.198558 kernel: audit: type=1400 audit(1707440005.192:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.198634 kernel: audit: type=1400 audit(1707440005.192:902): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.202761 kernel: audit: type=1400 audit(1707440005.192:903): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.202818 kernel: audit: type=1400 audit(1707440005.192:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.204704 kernel: audit: type=1400 audit(1707440005.192:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.208728 kernel: audit: type=1400 audit(1707440005.192:906): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.208778 kernel: audit: type=1400 audit(1707440005.192:907): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.212713 kernel: audit: type=1400 audit(1707440005.192:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.212756 kernel: audit: type=1400 audit(1707440005.195:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit: BPF prog-id=134 op=LOAD Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3427 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:25.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636363333830336533323661633230356136356532323166386430 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3427 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:25.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636363333830336533323661633230356136356532323166386430 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.195000 audit: BPF prog-id=135 op=LOAD Feb 9 00:53:25.195000 audit[3477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000316f80 items=0 ppid=3427 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:25.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636363333830336533323661633230356136356532323166386430 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.197000 audit: BPF prog-id=136 op=LOAD Feb 9 00:53:25.197000 audit[3477]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000316fc8 items=0 ppid=3427 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:25.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636363333830336533323661633230356136356532323166386430 Feb 9 00:53:25.199000 audit: BPF prog-id=136 op=UNLOAD Feb 9 00:53:25.199000 audit: BPF prog-id=135 op=UNLOAD Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:25.199000 audit: BPF prog-id=137 op=LOAD Feb 9 00:53:25.199000 audit[3477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003173d8 items=0 ppid=3427 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:25.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161636363333830336533323661633230356136356532323166386430 Feb 9 00:53:25.227937 env[1119]: time="2024-02-09T00:53:25.227893886Z" level=info msg="StartContainer for \"aaccc3803e326ac205a65e221f8d0912ed99e5df9e300b87a01f44256c250415\" returns successfully" Feb 9 00:53:25.268000 audit[3508]: AVC avc: denied { search } for pid=3508 comm="rpcbind" name="crypto" dev="proc" ino=26030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 00:53:25.268000 audit[3508]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdcda5200c0 a2=0 a3=0 items=0 ppid=3489 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 key=(null) Feb 9 00:53:25.268000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 00:53:25.300000 audit[3513]: AVC avc: denied { search } for pid=3513 comm="dbus-daemon" name="crypto" dev="proc" ino=26030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 00:53:25.300000 audit[3513]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f71a22570c0 a2=0 a3=0 items=0 ppid=3489 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 key=(null) Feb 9 00:53:25.300000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 00:53:25.302000 audit[3514]: AVC avc: denied { watch } for pid=3514 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538339 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c168,c241 tclass=dir permissive=0 Feb 9 00:53:25.302000 audit[3514]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5615a825a970 a2=2c8 a3=7fff3665d8fc items=0 ppid=3489 pid=3514 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 key=(null) Feb 9 00:53:25.302000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 00:53:25.305000 audit[3515]: AVC avc: denied { read } for pid=3515 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24153 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 00:53:25.305000 audit[3515]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fd8d9188320 a1=80000 a2=d a3=7fffdcd532b0 items=0 ppid=3489 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 key=(null) Feb 9 00:53:25.305000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 00:53:25.306000 audit[3515]: AVC avc: denied { search } for pid=3515 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 00:53:25.306000 audit[3515]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd8d86dc0c0 a2=0 a3=0 items=0 ppid=3489 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c241 key=(null) Feb 9 00:53:25.306000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 00:53:25.322231 kubelet[1427]: I0209 00:53:25.322198 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=0.797095825 podCreationTimestamp="2024-02-09 00:53:20 +0000 UTC" firstStartedPulling="2024-02-09 00:53:20.628552117 +0000 UTC m=+45.773678348" lastFinishedPulling="2024-02-09 00:53:25.153618082 +0000 UTC m=+50.298744313" observedRunningTime="2024-02-09 00:53:25.32197995 +0000 UTC m=+50.467106211" watchObservedRunningTime="2024-02-09 00:53:25.32216179 +0000 UTC m=+50.467288021" Feb 9 00:53:25.329000 audit[3532]: NETFILTER_CFG table=filter:87 family=2 entries=20 op=nft_register_rule pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:25.329000 audit[3532]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe36c5f710 a2=0 a3=7ffe36c5f6fc items=0 ppid=1643 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:25.329000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:25.332000 audit[3532]: NETFILTER_CFG table=nat:88 family=2 entries=104 op=nft_register_chain pid=3532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 00:53:25.332000 audit[3532]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffe36c5f710 a2=0 a3=7ffe36c5f6fc items=0 ppid=1643 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:25.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 00:53:26.136388 kubelet[1427]: E0209 00:53:26.136341 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:27.137382 kubelet[1427]: E0209 00:53:27.137341 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:28.138481 kubelet[1427]: E0209 00:53:28.138444 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:29.138865 kubelet[1427]: E0209 00:53:29.138831 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:30.139240 kubelet[1427]: E0209 00:53:30.139201 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:31.139638 kubelet[1427]: E0209 00:53:31.139587 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:32.140035 kubelet[1427]: E0209 00:53:32.139976 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:33.140263 kubelet[1427]: E0209 00:53:33.140213 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:34.141265 kubelet[1427]: E0209 00:53:34.141223 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:35.105451 kubelet[1427]: E0209 00:53:35.105406 1427 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:35.114693 env[1119]: time="2024-02-09T00:53:35.114654262Z" level=info msg="StopPodSandbox for \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\"" Feb 9 00:53:35.141913 kubelet[1427]: E0209 00:53:35.141868 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.144 [WARNING][3577] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--dt2tl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"caff008f-3171-4225-b413-c8276d238236", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102", Pod:"csi-node-driver-dt2tl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calibe23f50c34b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.144 [INFO][3577] k8s.go 578: Cleaning up netns ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.144 [INFO][3577] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" iface="eth0" netns="" Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.144 [INFO][3577] k8s.go 585: Releasing IP address(es) ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.144 [INFO][3577] utils.go 188: Calico CNI releasing IP address ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.160 [INFO][3584] ipam_plugin.go 415: Releasing address using handleID ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.160 [INFO][3584] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.160 [INFO][3584] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.168 [WARNING][3584] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.168 [INFO][3584] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.170 [INFO][3584] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.172212 env[1119]: 2024-02-09 00:53:35.171 [INFO][3577] k8s.go 591: Teardown processing complete. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:35.172877 env[1119]: time="2024-02-09T00:53:35.172239589Z" level=info msg="TearDown network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\" successfully" Feb 9 00:53:35.172877 env[1119]: time="2024-02-09T00:53:35.172271060Z" level=info msg="StopPodSandbox for \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\" returns successfully" Feb 9 00:53:35.172877 env[1119]: time="2024-02-09T00:53:35.172709412Z" level=info msg="RemovePodSandbox for \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\"" Feb 9 00:53:35.172877 env[1119]: time="2024-02-09T00:53:35.172750210Z" level=info msg="Forcibly stopping sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\"" Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.205 [WARNING][3608] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-csi--node--driver--dt2tl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"caff008f-3171-4225-b413-c8276d238236", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"70d346df81fce09f2e8f5e483fdafd31c95bb50a4ade536c52eba260b3684102", Pod:"csi-node-driver-dt2tl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calibe23f50c34b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.205 [INFO][3608] k8s.go 578: Cleaning up netns ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.205 [INFO][3608] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" iface="eth0" netns="" Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.205 [INFO][3608] k8s.go 585: Releasing IP address(es) ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.205 [INFO][3608] utils.go 188: Calico CNI releasing IP address ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.222 [INFO][3618] ipam_plugin.go 415: Releasing address using handleID ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.222 [INFO][3618] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.222 [INFO][3618] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.228 [WARNING][3618] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.228 [INFO][3618] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" HandleID="k8s-pod-network.f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Workload="10.0.0.120-k8s-csi--node--driver--dt2tl-eth0" Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.230 [INFO][3618] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.232657 env[1119]: 2024-02-09 00:53:35.231 [INFO][3608] k8s.go 591: Teardown processing complete. ContainerID="f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8" Feb 9 00:53:35.233225 env[1119]: time="2024-02-09T00:53:35.232684951Z" level=info msg="TearDown network for sandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\" successfully" Feb 9 00:53:35.235459 env[1119]: time="2024-02-09T00:53:35.235433332Z" level=info msg="RemovePodSandbox \"f5ec25e449aeaad0f65f7f7ae14457770b1dd79b9dc72d2e3f4e72bf98e0f6d8\" returns successfully" Feb 9 00:53:35.236032 env[1119]: time="2024-02-09T00:53:35.235995954Z" level=info msg="StopPodSandbox for \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\"" Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.269 [WARNING][3641] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0", GenerateName:"calico-kube-controllers-5f44497d7d-", Namespace:"calico-system", SelfLink:"", UID:"11558908-1e80-422d-9511-06bbda4b3f1e", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f44497d7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d", Pod:"calico-kube-controllers-5f44497d7d-9tsq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6ac050d244a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.269 [INFO][3641] k8s.go 578: Cleaning up netns ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.269 [INFO][3641] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" iface="eth0" netns="" Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.269 [INFO][3641] k8s.go 585: Releasing IP address(es) ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.269 [INFO][3641] utils.go 188: Calico CNI releasing IP address ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.285 [INFO][3650] ipam_plugin.go 415: Releasing address using handleID ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.285 [INFO][3650] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.285 [INFO][3650] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.291 [WARNING][3650] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.291 [INFO][3650] ipam_plugin.go 443: Releasing address using workloadID ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.293 [INFO][3650] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.295539 env[1119]: 2024-02-09 00:53:35.294 [INFO][3641] k8s.go 591: Teardown processing complete. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:35.295984 env[1119]: time="2024-02-09T00:53:35.295544332Z" level=info msg="TearDown network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\" successfully" Feb 9 00:53:35.295984 env[1119]: time="2024-02-09T00:53:35.295616792Z" level=info msg="StopPodSandbox for \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\" returns successfully" Feb 9 00:53:35.296168 env[1119]: time="2024-02-09T00:53:35.296114528Z" level=info msg="RemovePodSandbox for \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\"" Feb 9 00:53:35.296168 env[1119]: time="2024-02-09T00:53:35.296154084Z" level=info msg="Forcibly stopping sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\"" Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.326 [WARNING][3673] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0", GenerateName:"calico-kube-controllers-5f44497d7d-", Namespace:"calico-system", SelfLink:"", UID:"11558908-1e80-422d-9511-06bbda4b3f1e", ResourceVersion:"905", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f44497d7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"607434579f56895d943f908b65de4b1c9894d96d59ecc1e80cad763d65f7547d", Pod:"calico-kube-controllers-5f44497d7d-9tsq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.77.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6ac050d244a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.326 [INFO][3673] k8s.go 578: Cleaning up netns ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.326 [INFO][3673] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" iface="eth0" netns="" Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.326 [INFO][3673] k8s.go 585: Releasing IP address(es) ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.326 [INFO][3673] utils.go 188: Calico CNI releasing IP address ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.340 [INFO][3680] ipam_plugin.go 415: Releasing address using handleID ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.340 [INFO][3680] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.340 [INFO][3680] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.347 [WARNING][3680] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.347 [INFO][3680] ipam_plugin.go 443: Releasing address using workloadID ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" HandleID="k8s-pod-network.db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Workload="10.0.0.120-k8s-calico--kube--controllers--5f44497d7d--9tsq8-eth0" Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.348 [INFO][3680] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.351220 env[1119]: 2024-02-09 00:53:35.350 [INFO][3673] k8s.go 591: Teardown processing complete. ContainerID="db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57" Feb 9 00:53:35.351707 env[1119]: time="2024-02-09T00:53:35.351198708Z" level=info msg="TearDown network for sandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\" successfully" Feb 9 00:53:35.354106 env[1119]: time="2024-02-09T00:53:35.354056901Z" level=info msg="RemovePodSandbox \"db94b83d3b58dc041785382ff2d7a07d3a10035ab81831cc94dd739f921c4a57\" returns successfully" Feb 9 00:53:35.354519 env[1119]: time="2024-02-09T00:53:35.354487248Z" level=info msg="StopPodSandbox for \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\"" Feb 9 00:53:35.396184 kubelet[1427]: I0209 00:53:35.396134 1427 topology_manager.go:215] "Topology Admit Handler" podUID="005f30dd-a74d-4478-9a51-9ca11a0d14b0" podNamespace="default" podName="test-pod-1" Feb 9 00:53:35.401249 systemd[1]: Created slice kubepods-besteffort-pod005f30dd_a74d_4478_9a51_9ca11a0d14b0.slice. Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.383 [WARNING][3703] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b1ab66ca-725b-4df3-a0f1-e106971a48e5", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6", Pod:"coredns-5dd5756b68-7r5tn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif444f07b02b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.383 [INFO][3703] k8s.go 578: Cleaning up netns ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.383 [INFO][3703] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" iface="eth0" netns="" Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.383 [INFO][3703] k8s.go 585: Releasing IP address(es) ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.383 [INFO][3703] utils.go 188: Calico CNI releasing IP address ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.399 [INFO][3711] ipam_plugin.go 415: Releasing address using handleID ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.399 [INFO][3711] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.400 [INFO][3711] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.410 [WARNING][3711] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.410 [INFO][3711] ipam_plugin.go 443: Releasing address using workloadID ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.412 [INFO][3711] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.414258 env[1119]: 2024-02-09 00:53:35.413 [INFO][3703] k8s.go 591: Teardown processing complete. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:35.414623 env[1119]: time="2024-02-09T00:53:35.414296017Z" level=info msg="TearDown network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\" successfully" Feb 9 00:53:35.414623 env[1119]: time="2024-02-09T00:53:35.414324311Z" level=info msg="StopPodSandbox for \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\" returns successfully" Feb 9 00:53:35.414931 env[1119]: time="2024-02-09T00:53:35.414895710Z" level=info msg="RemovePodSandbox for \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\"" Feb 9 00:53:35.414931 env[1119]: time="2024-02-09T00:53:35.414921870Z" level=info msg="Forcibly stopping sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\"" Feb 9 00:53:35.425827 kubelet[1427]: I0209 00:53:35.425800 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rjhb9\" (UniqueName: \"kubernetes.io/projected/005f30dd-a74d-4478-9a51-9ca11a0d14b0-kube-api-access-rjhb9\") pod \"test-pod-1\" (UID: \"005f30dd-a74d-4478-9a51-9ca11a0d14b0\") " pod="default/test-pod-1" Feb 9 00:53:35.425918 kubelet[1427]: I0209 00:53:35.425840 1427 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-aa4c5acb-d262-4ee2-a22c-eb201ca1b467\" (UniqueName: \"kubernetes.io/nfs/005f30dd-a74d-4478-9a51-9ca11a0d14b0-pvc-aa4c5acb-d262-4ee2-a22c-eb201ca1b467\") pod \"test-pod-1\" (UID: \"005f30dd-a74d-4478-9a51-9ca11a0d14b0\") " pod="default/test-pod-1" Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.444 [WARNING][3735] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b1ab66ca-725b-4df3-a0f1-e106971a48e5", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"9f64da0ce81ef2df244eb68095f395341f1f758d078e7e2d4bca8645cac4d9e6", Pod:"coredns-5dd5756b68-7r5tn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.77.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif444f07b02b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.444 [INFO][3735] k8s.go 578: Cleaning up netns ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.444 [INFO][3735] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" iface="eth0" netns="" Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.444 [INFO][3735] k8s.go 585: Releasing IP address(es) ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.444 [INFO][3735] utils.go 188: Calico CNI releasing IP address ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.460 [INFO][3743] ipam_plugin.go 415: Releasing address using handleID ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.460 [INFO][3743] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.460 [INFO][3743] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.466 [WARNING][3743] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.466 [INFO][3743] ipam_plugin.go 443: Releasing address using workloadID ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" HandleID="k8s-pod-network.760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Workload="10.0.0.120-k8s-coredns--5dd5756b68--7r5tn-eth0" Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.467 [INFO][3743] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.469946 env[1119]: 2024-02-09 00:53:35.468 [INFO][3735] k8s.go 591: Teardown processing complete. ContainerID="760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d" Feb 9 00:53:35.470317 env[1119]: time="2024-02-09T00:53:35.469974800Z" level=info msg="TearDown network for sandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\" successfully" Feb 9 00:53:35.472986 env[1119]: time="2024-02-09T00:53:35.472948715Z" level=info msg="RemovePodSandbox \"760ee098f48d8b0ce2786611ddca4787631ab6662a10d438c8e1adcd5590397d\" returns successfully" Feb 9 00:53:35.473438 env[1119]: time="2024-02-09T00:53:35.473418147Z" level=info msg="StopPodSandbox for \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\"" Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.502 [WARNING][3766] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"7d87966c-cf98-4792-a947-3dded052fd55", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9", Pod:"coredns-5dd5756b68-mqf6q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.77.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliaaa52146270", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.502 [INFO][3766] k8s.go 578: Cleaning up netns ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.502 [INFO][3766] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" iface="eth0" netns="" Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.502 [INFO][3766] k8s.go 585: Releasing IP address(es) ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.502 [INFO][3766] utils.go 188: Calico CNI releasing IP address ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.519 [INFO][3774] ipam_plugin.go 415: Releasing address using handleID ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.519 [INFO][3774] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.519 [INFO][3774] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.525 [WARNING][3774] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.525 [INFO][3774] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.527 [INFO][3774] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.529323 env[1119]: 2024-02-09 00:53:35.528 [INFO][3766] k8s.go 591: Teardown processing complete. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:35.529807 env[1119]: time="2024-02-09T00:53:35.529353373Z" level=info msg="TearDown network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\" successfully" Feb 9 00:53:35.529807 env[1119]: time="2024-02-09T00:53:35.529384232Z" level=info msg="StopPodSandbox for \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\" returns successfully" Feb 9 00:53:35.529856 env[1119]: time="2024-02-09T00:53:35.529821613Z" level=info msg="RemovePodSandbox for \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\"" Feb 9 00:53:35.529881 env[1119]: time="2024-02-09T00:53:35.529844356Z" level=info msg="Forcibly stopping sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\"" Feb 9 00:53:35.534000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.540457 kernel: Failed to create system directory netfs Feb 9 00:53:35.540580 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 00:53:35.540613 kernel: audit: type=1400 audit(1707440015.534:925): avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.540636 kernel: Failed to create system directory netfs Feb 9 00:53:35.540655 kernel: audit: type=1400 audit(1707440015.534:925): avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.534000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.548415 kernel: Failed to create system directory netfs Feb 9 00:53:35.548521 kernel: audit: type=1400 audit(1707440015.534:925): avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.548562 kernel: Failed to create system directory netfs Feb 9 00:53:35.548618 kernel: audit: type=1400 audit(1707440015.534:925): avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.534000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.534000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.534000 audit[3795]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562db41e75e0 a1=153bc a2=562db2fa32b0 a3=5 items=0 ppid=485 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:35.553554 kernel: audit: type=1300 audit(1707440015.534:925): arch=c000003e syscall=175 success=yes exit=0 a0=562db41e75e0 a1=153bc a2=562db2fa32b0 a3=5 items=0 ppid=485 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:35.553588 kernel: audit: type=1327 audit(1707440015.534:925): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 00:53:35.534000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.560921 kernel: Failed to create system directory fscache Feb 9 00:53:35.560967 kernel: audit: type=1400 audit(1707440015.555:926): avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.560986 kernel: Failed to create system directory fscache Feb 9 00:53:35.561001 kernel: audit: type=1400 audit(1707440015.555:926): avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.563669 kernel: Failed to create system directory fscache Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.564276 kernel: audit: type=1400 audit(1707440015.555:926): avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.564315 kernel: Failed to create system directory fscache Feb 9 00:53:35.566521 kernel: audit: type=1400 audit(1707440015.555:926): avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.570362 kernel: Failed to create system directory fscache Feb 9 00:53:35.570394 kernel: Failed to create system directory fscache Feb 9 00:53:35.570416 kernel: Failed to create system directory fscache Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.571366 kernel: Failed to create system directory fscache Feb 9 00:53:35.571398 kernel: Failed to create system directory fscache Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.572374 kernel: Failed to create system directory fscache Feb 9 00:53:35.572413 kernel: Failed to create system directory fscache Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.573382 kernel: Failed to create system directory fscache Feb 9 00:53:35.573411 kernel: Failed to create system directory fscache Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.555000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.574380 kernel: Failed to create system directory fscache Feb 9 00:53:35.576094 kernel: FS-Cache: Loaded Feb 9 00:53:35.555000 audit[3795]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562db43fc9c0 a1=4c0fc a2=562db2fa32b0 a3=5 items=0 ppid=485 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:35.555000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.569 [WARNING][3801] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"7d87966c-cf98-4792-a947-3dded052fd55", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"13b3effc02e9ae6703e4508a56b2bd63df36038485d4ed6ac6b5f46c7e59e4a9", Pod:"coredns-5dd5756b68-mqf6q", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.77.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliaaa52146270", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.569 [INFO][3801] k8s.go 578: Cleaning up netns ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.569 [INFO][3801] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" iface="eth0" netns="" Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.569 [INFO][3801] k8s.go 585: Releasing IP address(es) ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.569 [INFO][3801] utils.go 188: Calico CNI releasing IP address ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.586 [INFO][3810] ipam_plugin.go 415: Releasing address using handleID ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.586 [INFO][3810] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.586 [INFO][3810] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.592 [WARNING][3810] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.592 [INFO][3810] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" HandleID="k8s-pod-network.3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Workload="10.0.0.120-k8s-coredns--5dd5756b68--mqf6q-eth0" Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.593 [INFO][3810] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.595443 env[1119]: 2024-02-09 00:53:35.594 [INFO][3801] k8s.go 591: Teardown processing complete. ContainerID="3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f" Feb 9 00:53:35.595976 env[1119]: time="2024-02-09T00:53:35.595943764Z" level=info msg="TearDown network for sandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\" successfully" Feb 9 00:53:35.599690 env[1119]: time="2024-02-09T00:53:35.599657820Z" level=info msg="RemovePodSandbox \"3fb6ec008f4f0388956c2927ece05235e3cf3054e449d2c1659bb158b9c6024f\" returns successfully" Feb 9 00:53:35.600129 env[1119]: time="2024-02-09T00:53:35.600108827Z" level=info msg="StopPodSandbox for \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\"" Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.601537 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.601582 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.601597 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.602472 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.602509 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.603608 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.603640 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.604600 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.604630 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.605541 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.605589 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.606539 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.606651 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.607508 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.607577 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.608484 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.608557 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.609465 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.609533 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.610453 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.610529 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.611445 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.611513 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.612442 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.612502 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.613420 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.613486 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.614402 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.614474 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.615441 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.615472 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.616370 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.616434 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.617348 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.617423 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.618324 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.618387 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.619344 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.619381 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.620284 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.620358 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.621294 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.621325 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.622244 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.622302 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.623228 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.623292 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.624238 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.624270 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.625241 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.625348 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.626227 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.626284 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.627216 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.627255 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.628172 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.628232 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.629220 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.629253 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.630168 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.630223 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.631192 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.631229 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.632252 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.632283 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.633345 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.633381 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.634356 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.634393 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.635450 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.635488 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.636429 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.636471 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.637418 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.637468 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.638400 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.638448 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.639383 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.639422 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.640369 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.640411 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.641355 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.641386 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.642349 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.642399 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.643334 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.643367 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.644324 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.644346 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.645306 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.645333 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.646286 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.646311 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.648176 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.648525 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.649143 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.650014 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.651622 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.651672 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.651708 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.653105 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.653136 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.653163 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.654093 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.654115 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.655571 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.655608 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.655625 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.656606 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.656647 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.658103 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.658132 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.658151 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.659101 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.659126 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.660147 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.660168 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.661261 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.661290 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.662373 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.662406 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.663399 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.663420 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.664494 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.664525 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.591000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.665572 kernel: Failed to create system directory sunrpc Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.635 [WARNING][3833] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"1e2ff3da-736b-4b4f-92fd-16822f1ecfce", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6", Pod:"nginx-deployment-6d5f899847-255gl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali073aa05e575", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.635 [INFO][3833] k8s.go 578: Cleaning up netns ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.635 [INFO][3833] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" iface="eth0" netns="" Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.635 [INFO][3833] k8s.go 585: Releasing IP address(es) ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.635 [INFO][3833] utils.go 188: Calico CNI releasing IP address ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.654 [INFO][3841] ipam_plugin.go 415: Releasing address using handleID ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.655 [INFO][3841] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.656 [INFO][3841] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.662 [WARNING][3841] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.662 [INFO][3841] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.663 [INFO][3841] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.665753 env[1119]: 2024-02-09 00:53:35.664 [INFO][3833] k8s.go 591: Teardown processing complete. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:35.665753 env[1119]: time="2024-02-09T00:53:35.665689167Z" level=info msg="TearDown network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\" successfully" Feb 9 00:53:35.665753 env[1119]: time="2024-02-09T00:53:35.665740646Z" level=info msg="StopPodSandbox for \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\" returns successfully" Feb 9 00:53:35.666577 env[1119]: time="2024-02-09T00:53:35.666527017Z" level=info msg="RemovePodSandbox for \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\"" Feb 9 00:53:35.666695 env[1119]: time="2024-02-09T00:53:35.666587474Z" level=info msg="Forcibly stopping sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\"" Feb 9 00:53:35.674297 kernel: RPC: Registered named UNIX socket transport module. Feb 9 00:53:35.674410 kernel: RPC: Registered udp transport module. Feb 9 00:53:35.674428 kernel: RPC: Registered tcp transport module. Feb 9 00:53:35.674445 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 00:53:35.591000 audit[3795]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562db4448ad0 a1=1588c4 a2=562db2fa32b0 a3=5 items=6 ppid=485 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:35.591000 audit: CWD cwd="/" Feb 9 00:53:35.591000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:35.591000 audit: PATH item=1 name=(null) inode=26944 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:35.591000 audit: PATH item=2 name=(null) inode=26944 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:35.591000 audit: PATH item=3 name=(null) inode=26945 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:35.591000 audit: PATH item=4 name=(null) inode=26944 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:35.591000 audit: PATH item=5 name=(null) inode=26946 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 00:53:35.591000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.700171 kernel: Failed to create system directory nfs Feb 9 00:53:35.700208 kernel: Failed to create system directory nfs Feb 9 00:53:35.700234 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.701112 kernel: Failed to create system directory nfs Feb 9 00:53:35.701153 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.702540 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.704371 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.705528 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.706458 kernel: Failed to create system directory nfs Feb 9 00:53:35.706574 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.707632 kernel: Failed to create system directory nfs Feb 9 00:53:35.707672 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.709291 kernel: Failed to create system directory nfs Feb 9 00:53:35.709329 kernel: Failed to create system directory nfs Feb 9 00:53:35.709346 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.710546 kernel: Failed to create system directory nfs Feb 9 00:53:35.710605 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.713118 kernel: Failed to create system directory nfs Feb 9 00:53:35.713242 kernel: Failed to create system directory nfs Feb 9 00:53:35.713261 kernel: Failed to create system directory nfs Feb 9 00:53:35.713278 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.715247 kernel: Failed to create system directory nfs Feb 9 00:53:35.715293 kernel: Failed to create system directory nfs Feb 9 00:53:35.715310 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.716232 kernel: Failed to create system directory nfs Feb 9 00:53:35.716291 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.717273 kernel: Failed to create system directory nfs Feb 9 00:53:35.717330 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.718293 kernel: Failed to create system directory nfs Feb 9 00:53:35.718343 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.719499 kernel: Failed to create system directory nfs Feb 9 00:53:35.719554 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.721314 kernel: Failed to create system directory nfs Feb 9 00:53:35.721376 kernel: Failed to create system directory nfs Feb 9 00:53:35.721391 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.722450 kernel: Failed to create system directory nfs Feb 9 00:53:35.722486 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.723103 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.724243 kernel: Failed to create system directory nfs Feb 9 00:53:35.724298 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.725386 kernel: Failed to create system directory nfs Feb 9 00:53:35.725444 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.726558 kernel: Failed to create system directory nfs Feb 9 00:53:35.726592 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.728178 kernel: Failed to create system directory nfs Feb 9 00:53:35.728215 kernel: Failed to create system directory nfs Feb 9 00:53:35.728233 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.729239 kernel: Failed to create system directory nfs Feb 9 00:53:35.729294 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.695 [WARNING][3864] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"1e2ff3da-736b-4b4f-92fd-16822f1ecfce", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"0d42174dbb951e6def18c7cb0a5d93bf82e2b049d90249cbcf4d007615b5efa6", Pod:"nginx-deployment-6d5f899847-255gl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali073aa05e575", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.696 [INFO][3864] k8s.go 578: Cleaning up netns ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.696 [INFO][3864] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" iface="eth0" netns="" Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.696 [INFO][3864] k8s.go 585: Releasing IP address(es) ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.696 [INFO][3864] utils.go 188: Calico CNI releasing IP address ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.718 [INFO][3873] ipam_plugin.go 415: Releasing address using handleID ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.718 [INFO][3873] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.718 [INFO][3873] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.725 [WARNING][3873] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.725 [INFO][3873] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" HandleID="k8s-pod-network.fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Workload="10.0.0.120-k8s-nginx--deployment--6d5f899847--255gl-eth0" Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.727 [INFO][3873] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:35.729693 env[1119]: 2024-02-09 00:53:35.728 [INFO][3864] k8s.go 591: Teardown processing complete. ContainerID="fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322" Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.730306 kernel: Failed to create system directory nfs Feb 9 00:53:35.730344 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.730446 env[1119]: time="2024-02-09T00:53:35.730261750Z" level=info msg="TearDown network for sandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\" successfully" Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.731246 kernel: Failed to create system directory nfs Feb 9 00:53:35.731286 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.732316 kernel: Failed to create system directory nfs Feb 9 00:53:35.732361 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.733331 kernel: Failed to create system directory nfs Feb 9 00:53:35.733398 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.734268 kernel: Failed to create system directory nfs Feb 9 00:53:35.734332 kernel: Failed to create system directory nfs Feb 9 00:53:35.692000 audit[3795]: AVC avc: denied { confidentiality } for pid=3795 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.692000 audit[3795]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562db45eb680 a1=e29dc a2=562db2fa32b0 a3=5 items=0 ppid=485 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:35.692000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 00:53:35.748100 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 00:53:35.813096 env[1119]: time="2024-02-09T00:53:35.813024648Z" level=info msg="RemovePodSandbox \"fcfae4b07aedff8eab3b13a0b92ce5081945142ec7c5a873889da846a72e2322\" returns successfully" Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.842226 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.842343 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.842362 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.842375 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.843200 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.843224 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.844282 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.844306 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.845603 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.845625 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.847471 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.847494 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.847511 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.848431 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.848449 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.849394 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.849412 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.850340 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.850362 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.851283 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.851305 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.852226 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.852253 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.853177 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.853204 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.854120 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.854148 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.855095 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.855116 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.856506 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.856530 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.856545 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.857469 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.857487 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.858421 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.858439 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.859370 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.859388 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.860324 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.860348 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.861271 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.861293 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.862223 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.862251 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.863167 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.863190 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.864110 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.864127 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.865516 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.865539 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.865555 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.866464 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.866488 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.867412 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.867433 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.868355 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.868378 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.869308 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.869330 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.870266 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.870284 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.871239 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.871256 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.872221 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.872247 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.873190 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.873207 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.874161 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.874183 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.875139 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.875185 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.876112 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.876129 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.877107 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.877136 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.878557 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.878630 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.878654 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.879557 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.879608 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.880509 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.880545 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.881474 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.881511 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.882443 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.882470 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.883430 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.883453 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.884412 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.884434 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.885390 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.885407 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:35.886369 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.886387 kernel: Failed to create system directory nfs4 Feb 9 00:53:35.830000 audit[3883]: AVC avc: denied { confidentiality } for pid=3883 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.025155 kernel: NFS: Registering the id_resolver key type Feb 9 00:53:36.025304 kernel: Key type id_resolver registered Feb 9 00:53:36.025326 kernel: Key type id_legacy registered Feb 9 00:53:35.830000 audit[3883]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5b60be4010 a1=1d3cc4 a2=556a238862b0 a3=5 items=0 ppid=485 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:35.830000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.036527 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.036559 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.036580 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.036597 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.037521 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.037540 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.038501 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.038518 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.039479 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.039505 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.040475 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.040497 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.041460 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.041476 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.042451 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.042489 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.043478 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.043504 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.044455 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.044482 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.045441 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.045463 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.046427 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.046449 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.047404 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.047421 kernel: Failed to create system directory rpcgss Feb 9 00:53:36.031000 audit[3884]: AVC avc: denied { confidentiality } for pid=3884 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 00:53:36.031000 audit[3884]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fd1f1dfd010 a1=4f524 a2=55cb7694d2b0 a3=5 items=0 ppid=485 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.031000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 00:53:36.058211 nfsidmap[3894]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 00:53:36.060687 nfsidmap[3897]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 00:53:36.067000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 00:53:36.067000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5584a02c24b0 a2=10 a3=2364e926af01d5ca items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.067000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 00:53:36.067000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 00:53:36.067000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 00:53:36.067000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5584a02c24b0 a2=10 a3=2364e926af01d5ca items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.067000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 00:53:36.067000 audit[1179]: AVC avc: denied { watch_reads } for pid=1179 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 00:53:36.067000 audit[1179]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5584a02c24b0 a2=10 a3=2364e926af01d5ca items=0 ppid=1 pid=1179 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.067000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 00:53:36.067000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 00:53:36.067000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 00:53:36.142629 kubelet[1427]: E0209 00:53:36.142594 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:36.303562 env[1119]: time="2024-02-09T00:53:36.303454934Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:005f30dd-a74d-4478-9a51-9ca11a0d14b0,Namespace:default,Attempt:0,}" Feb 9 00:53:36.394350 systemd-networkd[1014]: cali5ec59c6bf6e: Link UP Feb 9 00:53:36.396033 systemd-networkd[1014]: cali5ec59c6bf6e: Gained carrier Feb 9 00:53:36.396150 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 00:53:36.396179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.340 [INFO][3900] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.120-k8s-test--pod--1-eth0 default 005f30dd-a74d-4478-9a51-9ca11a0d14b0 1072 0 2024-02-09 00:53:20 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.120 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.340 [INFO][3900] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.361 [INFO][3914] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" HandleID="k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Workload="10.0.0.120-k8s-test--pod--1-eth0" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.371 [INFO][3914] ipam_plugin.go 268: Auto assigning IP ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" HandleID="k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Workload="10.0.0.120-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027dbb0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.120", "pod":"test-pod-1", "timestamp":"2024-02-09 00:53:36.36156242 +0000 UTC"}, Hostname:"10.0.0.120", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.371 [INFO][3914] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.371 [INFO][3914] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.371 [INFO][3914] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.120' Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.372 [INFO][3914] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.375 [INFO][3914] ipam.go 372: Looking up existing affinities for host host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.379 [INFO][3914] ipam.go 489: Trying affinity for 192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.380 [INFO][3914] ipam.go 155: Attempting to load block cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.382 [INFO][3914] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.77.64/26 host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.382 [INFO][3914] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.77.64/26 handle="k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.383 [INFO][3914] ipam.go 1682: Creating new handle: k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.386 [INFO][3914] ipam.go 1203: Writing block in order to claim IPs block=192.168.77.64/26 handle="k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.390 [INFO][3914] ipam.go 1216: Successfully claimed IPs: [192.168.77.71/26] block=192.168.77.64/26 handle="k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.390 [INFO][3914] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.77.71/26] handle="k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" host="10.0.0.120" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.390 [INFO][3914] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.390 [INFO][3914] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.77.71/26] IPv6=[] ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" HandleID="k8s-pod-network.757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Workload="10.0.0.120-k8s-test--pod--1-eth0" Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.392 [INFO][3900] k8s.go 385: Populated endpoint ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"005f30dd-a74d-4478-9a51-9ca11a0d14b0", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 53, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:36.401658 env[1119]: 2024-02-09 00:53:36.392 [INFO][3900] k8s.go 386: Calico CNI using IPs: [192.168.77.71/32] ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 9 00:53:36.402381 env[1119]: 2024-02-09 00:53:36.392 [INFO][3900] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 9 00:53:36.402381 env[1119]: 2024-02-09 00:53:36.396 [INFO][3900] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 9 00:53:36.402381 env[1119]: 2024-02-09 00:53:36.396 [INFO][3900] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.120-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"005f30dd-a74d-4478-9a51-9ca11a0d14b0", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 0, 53, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.120", ContainerID:"757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.77.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ee:93:6b:b4:a0:81", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 00:53:36.402381 env[1119]: 2024-02-09 00:53:36.400 [INFO][3900] k8s.go 491: Wrote updated endpoint to datastore ContainerID="757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.120-k8s-test--pod--1-eth0" Feb 9 00:53:36.409000 audit[3939]: NETFILTER_CFG table=filter:89 family=2 entries=46 op=nft_register_chain pid=3939 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 00:53:36.409000 audit[3939]: SYSCALL arch=c000003e syscall=46 success=yes exit=21440 a0=3 a1=7fff2325c880 a2=0 a3=7fff2325c86c items=0 ppid=2276 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.409000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 00:53:36.411920 env[1119]: time="2024-02-09T00:53:36.411859508Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 00:53:36.411920 env[1119]: time="2024-02-09T00:53:36.411901198Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 00:53:36.411920 env[1119]: time="2024-02-09T00:53:36.411911838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 00:53:36.412180 env[1119]: time="2024-02-09T00:53:36.412051036Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b pid=3944 runtime=io.containerd.runc.v2 Feb 9 00:53:36.427763 systemd[1]: Started cri-containerd-757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b.scope. Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.435000 audit: BPF prog-id=138 op=LOAD Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376633376530636338303830303961383332363630306230663632 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376633376530636338303830303961383332363630306230663632 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit: BPF prog-id=139 op=LOAD Feb 9 00:53:36.436000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029e750 items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376633376530636338303830303961383332363630306230663632 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit: BPF prog-id=140 op=LOAD Feb 9 00:53:36.436000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029e798 items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376633376530636338303830303961383332363630306230663632 Feb 9 00:53:36.436000 audit: BPF prog-id=140 op=UNLOAD Feb 9 00:53:36.436000 audit: BPF prog-id=139 op=UNLOAD Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.436000 audit: BPF prog-id=141 op=LOAD Feb 9 00:53:36.436000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029eba8 items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735376633376530636338303830303961383332363630306230663632 Feb 9 00:53:36.438569 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 00:53:36.461795 env[1119]: time="2024-02-09T00:53:36.461744093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:005f30dd-a74d-4478-9a51-9ca11a0d14b0,Namespace:default,Attempt:0,} returns sandbox id \"757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b\"" Feb 9 00:53:36.463051 env[1119]: time="2024-02-09T00:53:36.463031526Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 00:53:36.864340 env[1119]: time="2024-02-09T00:53:36.864298099Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:36.865911 env[1119]: time="2024-02-09T00:53:36.865870739Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:36.867184 env[1119]: time="2024-02-09T00:53:36.867143292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:36.868607 env[1119]: time="2024-02-09T00:53:36.868580263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 00:53:36.869051 env[1119]: time="2024-02-09T00:53:36.869025868Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 00:53:36.870306 env[1119]: time="2024-02-09T00:53:36.870277412Z" level=info msg="CreateContainer within sandbox \"757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 00:53:36.881500 env[1119]: time="2024-02-09T00:53:36.881465717Z" level=info msg="CreateContainer within sandbox \"757f37e0cc808009a8326600b0f628fed9cd9ae044e4ab50a560b59f69d6881b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"8f108f7b4f13475f5e68eabc0457861be7e97d37537c8057ea763add1b9c335f\"" Feb 9 00:53:36.881891 env[1119]: time="2024-02-09T00:53:36.881864312Z" level=info msg="StartContainer for \"8f108f7b4f13475f5e68eabc0457861be7e97d37537c8057ea763add1b9c335f\"" Feb 9 00:53:36.895942 systemd[1]: Started cri-containerd-8f108f7b4f13475f5e68eabc0457861be7e97d37537c8057ea763add1b9c335f.scope. Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.902000 audit: BPF prog-id=142 op=LOAD Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3944 pid=3984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313038663762346631333437356635653638656162633034353738 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3944 pid=3984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313038663762346631333437356635653638656162633034353738 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit: BPF prog-id=143 op=LOAD Feb 9 00:53:36.903000 audit[3984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d40a0 items=0 ppid=3944 pid=3984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313038663762346631333437356635653638656162633034353738 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit: BPF prog-id=144 op=LOAD Feb 9 00:53:36.903000 audit[3984]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d40e8 items=0 ppid=3944 pid=3984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313038663762346631333437356635653638656162633034353738 Feb 9 00:53:36.903000 audit: BPF prog-id=144 op=UNLOAD Feb 9 00:53:36.903000 audit: BPF prog-id=143 op=UNLOAD Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { perfmon } for pid=3984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit[3984]: AVC avc: denied { bpf } for pid=3984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 00:53:36.903000 audit: BPF prog-id=145 op=LOAD Feb 9 00:53:36.903000 audit[3984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d44f8 items=0 ppid=3944 pid=3984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 00:53:36.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866313038663762346631333437356635653638656162633034353738 Feb 9 00:53:36.916044 env[1119]: time="2024-02-09T00:53:36.916003321Z" level=info msg="StartContainer for \"8f108f7b4f13475f5e68eabc0457861be7e97d37537c8057ea763add1b9c335f\" returns successfully" Feb 9 00:53:37.143534 kubelet[1427]: E0209 00:53:37.143406 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:37.348642 kubelet[1427]: I0209 00:53:37.348608 1427 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.942151058 podCreationTimestamp="2024-02-09 00:53:20 +0000 UTC" firstStartedPulling="2024-02-09 00:53:36.462796545 +0000 UTC m=+61.607922776" lastFinishedPulling="2024-02-09 00:53:36.869218699 +0000 UTC m=+62.014344930" observedRunningTime="2024-02-09 00:53:37.348518908 +0000 UTC m=+62.493645159" watchObservedRunningTime="2024-02-09 00:53:37.348573212 +0000 UTC m=+62.493699433" Feb 9 00:53:37.670249 systemd-networkd[1014]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 00:53:38.143854 kubelet[1427]: E0209 00:53:38.143814 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:39.143989 kubelet[1427]: E0209 00:53:39.143943 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:40.144211 kubelet[1427]: E0209 00:53:40.144182 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:41.144680 kubelet[1427]: E0209 00:53:41.144645 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:42.144783 kubelet[1427]: E0209 00:53:42.144744 1427 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 00:53:42.604361 systemd[1]: run-containerd-runc-k8s.io-ca3bfade6d9bca632b5c0c99a9e8e2f8983793d912168c4e969a2a81a8259ea7-runc.Xdg3UT.mount: Deactivated successfully.