Feb 9 01:07:29.776998 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 01:07:29.777019 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 01:07:29.777032 kernel: BIOS-provided physical RAM map: Feb 9 01:07:29.777039 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 01:07:29.777046 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 01:07:29.777053 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 01:07:29.777080 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 01:07:29.777092 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 01:07:29.777100 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 01:07:29.777109 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 01:07:29.777117 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Feb 9 01:07:29.777124 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 01:07:29.777132 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 01:07:29.777139 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 01:07:29.777149 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 01:07:29.777162 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 01:07:29.777168 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 01:07:29.777174 kernel: NX (Execute Disable) protection: active Feb 9 01:07:29.777181 kernel: e820: update [mem 0x9b3f9018-0x9b402c57] usable ==> usable Feb 9 01:07:29.777189 kernel: e820: update [mem 0x9b3f9018-0x9b402c57] usable ==> usable Feb 9 01:07:29.777196 kernel: e820: update [mem 0x9b1ac018-0x9b1e8e57] usable ==> usable Feb 9 01:07:29.777204 kernel: e820: update [mem 0x9b1ac018-0x9b1e8e57] usable ==> usable Feb 9 01:07:29.777212 kernel: extended physical RAM map: Feb 9 01:07:29.777220 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 01:07:29.777228 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 01:07:29.777238 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 01:07:29.777246 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 01:07:29.777254 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 01:07:29.777261 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 01:07:29.777269 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 01:07:29.777277 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b1ac017] usable Feb 9 01:07:29.777285 kernel: reserve setup_data: [mem 0x000000009b1ac018-0x000000009b1e8e57] usable Feb 9 01:07:29.777291 kernel: reserve setup_data: [mem 0x000000009b1e8e58-0x000000009b3f9017] usable Feb 9 01:07:29.777296 kernel: reserve setup_data: [mem 0x000000009b3f9018-0x000000009b402c57] usable Feb 9 01:07:29.777302 kernel: reserve setup_data: [mem 0x000000009b402c58-0x000000009c8eefff] usable Feb 9 01:07:29.777308 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 01:07:29.777315 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 01:07:29.777321 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 01:07:29.777326 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 01:07:29.777332 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 01:07:29.777340 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 01:07:29.777347 kernel: efi: EFI v2.70 by EDK II Feb 9 01:07:29.777353 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Feb 9 01:07:29.777360 kernel: random: crng init done Feb 9 01:07:29.777366 kernel: SMBIOS 2.8 present. Feb 9 01:07:29.777373 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Feb 9 01:07:29.777379 kernel: Hypervisor detected: KVM Feb 9 01:07:29.777385 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 01:07:29.777392 kernel: kvm-clock: cpu 0, msr 33faa001, primary cpu clock Feb 9 01:07:29.777398 kernel: kvm-clock: using sched offset of 3881265919 cycles Feb 9 01:07:29.777405 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 01:07:29.777411 kernel: tsc: Detected 2794.750 MHz processor Feb 9 01:07:29.777420 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 01:07:29.777428 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 01:07:29.777434 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Feb 9 01:07:29.777442 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 01:07:29.777450 kernel: Using GB pages for direct mapping Feb 9 01:07:29.777456 kernel: Secure boot disabled Feb 9 01:07:29.777462 kernel: ACPI: Early table checksum verification disabled Feb 9 01:07:29.777468 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Feb 9 01:07:29.777475 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Feb 9 01:07:29.777482 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 01:07:29.777489 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 01:07:29.777495 kernel: ACPI: FACS 0x000000009CBDD000 000040 Feb 9 01:07:29.777501 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 01:07:29.777508 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 01:07:29.777514 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 01:07:29.777521 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Feb 9 01:07:29.777527 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Feb 9 01:07:29.777533 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Feb 9 01:07:29.777541 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Feb 9 01:07:29.777547 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Feb 9 01:07:29.777553 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Feb 9 01:07:29.777560 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Feb 9 01:07:29.777566 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Feb 9 01:07:29.777572 kernel: No NUMA configuration found Feb 9 01:07:29.777578 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Feb 9 01:07:29.777585 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Feb 9 01:07:29.777591 kernel: Zone ranges: Feb 9 01:07:29.777598 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 01:07:29.777605 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Feb 9 01:07:29.777611 kernel: Normal empty Feb 9 01:07:29.777617 kernel: Movable zone start for each node Feb 9 01:07:29.777624 kernel: Early memory node ranges Feb 9 01:07:29.777630 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 01:07:29.777636 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Feb 9 01:07:29.777643 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Feb 9 01:07:29.777649 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Feb 9 01:07:29.777656 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Feb 9 01:07:29.777662 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Feb 9 01:07:29.777668 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Feb 9 01:07:29.777675 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 01:07:29.777681 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 01:07:29.777687 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Feb 9 01:07:29.777694 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 01:07:29.777700 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Feb 9 01:07:29.777706 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Feb 9 01:07:29.777714 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Feb 9 01:07:29.777720 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 01:07:29.777726 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 01:07:29.777733 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 01:07:29.777739 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 01:07:29.777746 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 01:07:29.777752 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 01:07:29.777758 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 01:07:29.777765 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 01:07:29.777772 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 01:07:29.777778 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 01:07:29.777784 kernel: TSC deadline timer available Feb 9 01:07:29.777791 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 9 01:07:29.777797 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 9 01:07:29.777803 kernel: kvm-guest: setup PV sched yield Feb 9 01:07:29.777809 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Feb 9 01:07:29.777816 kernel: Booting paravirtualized kernel on KVM Feb 9 01:07:29.777822 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 01:07:29.777829 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 9 01:07:29.777836 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 9 01:07:29.777843 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 9 01:07:29.777853 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 9 01:07:29.777861 kernel: kvm-guest: setup async PF for cpu 0 Feb 9 01:07:29.777878 kernel: kvm-guest: stealtime: cpu 0, msr 9ae1c0c0 Feb 9 01:07:29.777885 kernel: kvm-guest: PV spinlocks enabled Feb 9 01:07:29.777892 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 01:07:29.777899 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Feb 9 01:07:29.777905 kernel: Policy zone: DMA32 Feb 9 01:07:29.777921 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 01:07:29.777928 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 01:07:29.777936 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 01:07:29.777943 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 01:07:29.777955 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 01:07:29.777963 kernel: Memory: 2400436K/2567000K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 166304K reserved, 0K cma-reserved) Feb 9 01:07:29.777970 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 01:07:29.777977 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 01:07:29.777984 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 01:07:29.777991 kernel: rcu: Hierarchical RCU implementation. Feb 9 01:07:29.777999 kernel: rcu: RCU event tracing is enabled. Feb 9 01:07:29.778006 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 01:07:29.778013 kernel: Rude variant of Tasks RCU enabled. Feb 9 01:07:29.778020 kernel: Tracing variant of Tasks RCU enabled. Feb 9 01:07:29.778027 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 01:07:29.778034 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 01:07:29.778047 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 9 01:07:29.778058 kernel: Console: colour dummy device 80x25 Feb 9 01:07:29.778065 kernel: printk: console [ttyS0] enabled Feb 9 01:07:29.778071 kernel: ACPI: Core revision 20210730 Feb 9 01:07:29.778078 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 01:07:29.778085 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 01:07:29.778092 kernel: x2apic enabled Feb 9 01:07:29.778098 kernel: Switched APIC routing to physical x2apic. Feb 9 01:07:29.778105 kernel: kvm-guest: setup PV IPIs Feb 9 01:07:29.778113 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 01:07:29.778120 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 01:07:29.778126 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 9 01:07:29.778133 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 9 01:07:29.778140 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 9 01:07:29.778147 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 9 01:07:29.778154 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 01:07:29.778160 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 01:07:29.778167 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 01:07:29.778175 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 01:07:29.778182 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 9 01:07:29.778188 kernel: RETBleed: Mitigation: untrained return thunk Feb 9 01:07:29.778195 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 01:07:29.778202 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 01:07:29.778209 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 01:07:29.778216 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 01:07:29.778222 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 01:07:29.778230 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 01:07:29.778237 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 01:07:29.778244 kernel: Freeing SMP alternatives memory: 32K Feb 9 01:07:29.778251 kernel: pid_max: default: 32768 minimum: 301 Feb 9 01:07:29.778257 kernel: LSM: Security Framework initializing Feb 9 01:07:29.778264 kernel: SELinux: Initializing. Feb 9 01:07:29.778271 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 01:07:29.778278 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 01:07:29.778285 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 9 01:07:29.778292 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 9 01:07:29.778299 kernel: ... version: 0 Feb 9 01:07:29.778305 kernel: ... bit width: 48 Feb 9 01:07:29.778312 kernel: ... generic registers: 6 Feb 9 01:07:29.778319 kernel: ... value mask: 0000ffffffffffff Feb 9 01:07:29.778326 kernel: ... max period: 00007fffffffffff Feb 9 01:07:29.778332 kernel: ... fixed-purpose events: 0 Feb 9 01:07:29.778339 kernel: ... event mask: 000000000000003f Feb 9 01:07:29.778346 kernel: signal: max sigframe size: 1776 Feb 9 01:07:29.778353 kernel: rcu: Hierarchical SRCU implementation. Feb 9 01:07:29.778360 kernel: smp: Bringing up secondary CPUs ... Feb 9 01:07:29.778367 kernel: x86: Booting SMP configuration: Feb 9 01:07:29.778374 kernel: .... node #0, CPUs: #1 Feb 9 01:07:29.778380 kernel: kvm-clock: cpu 1, msr 33faa041, secondary cpu clock Feb 9 01:07:29.778387 kernel: kvm-guest: setup async PF for cpu 1 Feb 9 01:07:29.778394 kernel: kvm-guest: stealtime: cpu 1, msr 9ae9c0c0 Feb 9 01:07:29.778400 kernel: #2 Feb 9 01:07:29.778408 kernel: kvm-clock: cpu 2, msr 33faa081, secondary cpu clock Feb 9 01:07:29.778415 kernel: kvm-guest: setup async PF for cpu 2 Feb 9 01:07:29.778424 kernel: kvm-guest: stealtime: cpu 2, msr 9af1c0c0 Feb 9 01:07:29.778431 kernel: #3 Feb 9 01:07:29.778439 kernel: kvm-clock: cpu 3, msr 33faa0c1, secondary cpu clock Feb 9 01:07:29.778446 kernel: kvm-guest: setup async PF for cpu 3 Feb 9 01:07:29.778453 kernel: kvm-guest: stealtime: cpu 3, msr 9af9c0c0 Feb 9 01:07:29.778460 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 01:07:29.778466 kernel: smpboot: Max logical packages: 1 Feb 9 01:07:29.778473 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 9 01:07:29.778480 kernel: devtmpfs: initialized Feb 9 01:07:29.778488 kernel: x86/mm: Memory block size: 128MB Feb 9 01:07:29.778494 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Feb 9 01:07:29.778501 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Feb 9 01:07:29.778508 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Feb 9 01:07:29.778515 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Feb 9 01:07:29.778522 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Feb 9 01:07:29.778529 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 01:07:29.778535 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 01:07:29.778542 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 01:07:29.778550 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 01:07:29.778557 kernel: audit: initializing netlink subsys (disabled) Feb 9 01:07:29.778563 kernel: audit: type=2000 audit(1707440849.765:1): state=initialized audit_enabled=0 res=1 Feb 9 01:07:29.778570 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 01:07:29.778577 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 01:07:29.778583 kernel: cpuidle: using governor menu Feb 9 01:07:29.778590 kernel: ACPI: bus type PCI registered Feb 9 01:07:29.778597 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 01:07:29.778603 kernel: dca service started, version 1.12.1 Feb 9 01:07:29.778611 kernel: PCI: Using configuration type 1 for base access Feb 9 01:07:29.778618 kernel: PCI: Using configuration type 1 for extended access Feb 9 01:07:29.778625 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 01:07:29.778631 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 01:07:29.778638 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 01:07:29.778645 kernel: ACPI: Added _OSI(Module Device) Feb 9 01:07:29.778651 kernel: ACPI: Added _OSI(Processor Device) Feb 9 01:07:29.778658 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 01:07:29.778665 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 01:07:29.778673 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 01:07:29.778679 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 01:07:29.778686 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 01:07:29.778693 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 01:07:29.778700 kernel: ACPI: Interpreter enabled Feb 9 01:07:29.778706 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 01:07:29.778713 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 01:07:29.778720 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 01:07:29.778726 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 01:07:29.778734 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 01:07:29.778849 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 01:07:29.778860 kernel: acpiphp: Slot [3] registered Feb 9 01:07:29.778878 kernel: acpiphp: Slot [4] registered Feb 9 01:07:29.778885 kernel: acpiphp: Slot [5] registered Feb 9 01:07:29.778891 kernel: acpiphp: Slot [6] registered Feb 9 01:07:29.778898 kernel: acpiphp: Slot [7] registered Feb 9 01:07:29.778904 kernel: acpiphp: Slot [8] registered Feb 9 01:07:29.778911 kernel: acpiphp: Slot [9] registered Feb 9 01:07:29.778920 kernel: acpiphp: Slot [10] registered Feb 9 01:07:29.778927 kernel: acpiphp: Slot [11] registered Feb 9 01:07:29.778934 kernel: acpiphp: Slot [12] registered Feb 9 01:07:29.778940 kernel: acpiphp: Slot [13] registered Feb 9 01:07:29.778952 kernel: acpiphp: Slot [14] registered Feb 9 01:07:29.778960 kernel: acpiphp: Slot [15] registered Feb 9 01:07:29.778966 kernel: acpiphp: Slot [16] registered Feb 9 01:07:29.778973 kernel: acpiphp: Slot [17] registered Feb 9 01:07:29.778980 kernel: acpiphp: Slot [18] registered Feb 9 01:07:29.778987 kernel: acpiphp: Slot [19] registered Feb 9 01:07:29.778994 kernel: acpiphp: Slot [20] registered Feb 9 01:07:29.779001 kernel: acpiphp: Slot [21] registered Feb 9 01:07:29.779007 kernel: acpiphp: Slot [22] registered Feb 9 01:07:29.779014 kernel: acpiphp: Slot [23] registered Feb 9 01:07:29.779021 kernel: acpiphp: Slot [24] registered Feb 9 01:07:29.779027 kernel: acpiphp: Slot [25] registered Feb 9 01:07:29.779034 kernel: acpiphp: Slot [26] registered Feb 9 01:07:29.779041 kernel: acpiphp: Slot [27] registered Feb 9 01:07:29.779048 kernel: acpiphp: Slot [28] registered Feb 9 01:07:29.779055 kernel: acpiphp: Slot [29] registered Feb 9 01:07:29.779061 kernel: acpiphp: Slot [30] registered Feb 9 01:07:29.779068 kernel: acpiphp: Slot [31] registered Feb 9 01:07:29.779075 kernel: PCI host bridge to bus 0000:00 Feb 9 01:07:29.779152 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 01:07:29.779216 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 01:07:29.779277 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 01:07:29.779339 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 9 01:07:29.779399 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Feb 9 01:07:29.779459 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 01:07:29.779541 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 01:07:29.779616 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 01:07:29.779691 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 01:07:29.779760 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 9 01:07:29.779830 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 01:07:29.779912 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 01:07:29.779987 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 01:07:29.780054 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 01:07:29.780130 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 01:07:29.780198 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 01:07:29.780268 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 9 01:07:29.780342 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 9 01:07:29.780411 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Feb 9 01:07:29.780477 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Feb 9 01:07:29.780542 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Feb 9 01:07:29.780608 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Feb 9 01:07:29.780695 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 01:07:29.780793 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 01:07:29.780925 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 9 01:07:29.781020 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Feb 9 01:07:29.781106 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Feb 9 01:07:29.781201 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 01:07:29.781269 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 01:07:29.781349 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Feb 9 01:07:29.781423 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Feb 9 01:07:29.781501 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 9 01:07:29.781568 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 01:07:29.781634 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Feb 9 01:07:29.781715 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Feb 9 01:07:29.781785 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Feb 9 01:07:29.781794 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 01:07:29.781804 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 01:07:29.781811 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 01:07:29.781817 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 01:07:29.781824 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 01:07:29.781831 kernel: iommu: Default domain type: Translated Feb 9 01:07:29.781838 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 01:07:29.781956 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 01:07:29.782025 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 01:07:29.782090 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 01:07:29.782101 kernel: vgaarb: loaded Feb 9 01:07:29.782108 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 01:07:29.782115 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 01:07:29.782122 kernel: PTP clock support registered Feb 9 01:07:29.782129 kernel: Registered efivars operations Feb 9 01:07:29.782135 kernel: PCI: Using ACPI for IRQ routing Feb 9 01:07:29.782142 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 01:07:29.782149 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Feb 9 01:07:29.782156 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Feb 9 01:07:29.782163 kernel: e820: reserve RAM buffer [mem 0x9b1ac018-0x9bffffff] Feb 9 01:07:29.782170 kernel: e820: reserve RAM buffer [mem 0x9b3f9018-0x9bffffff] Feb 9 01:07:29.782176 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Feb 9 01:07:29.782183 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Feb 9 01:07:29.782190 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 01:07:29.782196 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 01:07:29.782203 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 01:07:29.782210 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 01:07:29.782217 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 01:07:29.782224 kernel: pnp: PnP ACPI init Feb 9 01:07:29.782295 kernel: pnp 00:02: [dma 2] Feb 9 01:07:29.782304 kernel: pnp: PnP ACPI: found 6 devices Feb 9 01:07:29.782312 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 01:07:29.782319 kernel: NET: Registered PF_INET protocol family Feb 9 01:07:29.782325 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 01:07:29.782332 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 01:07:29.782339 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 01:07:29.782348 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 01:07:29.782354 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 01:07:29.782361 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 01:07:29.782368 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 01:07:29.782375 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 01:07:29.782382 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 01:07:29.782389 kernel: NET: Registered PF_XDP protocol family Feb 9 01:07:29.782456 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Feb 9 01:07:29.782548 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Feb 9 01:07:29.782613 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 01:07:29.782674 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 01:07:29.782733 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 01:07:29.782793 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 9 01:07:29.782852 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Feb 9 01:07:29.782934 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 01:07:29.783010 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 01:07:29.783081 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 01:07:29.783091 kernel: PCI: CLS 0 bytes, default 64 Feb 9 01:07:29.783098 kernel: Initialise system trusted keyrings Feb 9 01:07:29.783105 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 01:07:29.783112 kernel: Key type asymmetric registered Feb 9 01:07:29.783119 kernel: Asymmetric key parser 'x509' registered Feb 9 01:07:29.783127 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 01:07:29.783134 kernel: io scheduler mq-deadline registered Feb 9 01:07:29.783141 kernel: io scheduler kyber registered Feb 9 01:07:29.783149 kernel: io scheduler bfq registered Feb 9 01:07:29.783156 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 01:07:29.783164 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 01:07:29.783171 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 01:07:29.783180 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 01:07:29.783190 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 01:07:29.783199 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 01:07:29.783209 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 01:07:29.783217 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 01:07:29.783225 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 01:07:29.783301 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 9 01:07:29.783313 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 01:07:29.783375 kernel: rtc_cmos 00:05: registered as rtc0 Feb 9 01:07:29.783437 kernel: rtc_cmos 00:05: setting system clock to 2024-02-09T01:07:29 UTC (1707440849) Feb 9 01:07:29.783502 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 9 01:07:29.783511 kernel: efifb: probing for efifb Feb 9 01:07:29.783519 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Feb 9 01:07:29.783526 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Feb 9 01:07:29.783533 kernel: efifb: scrolling: redraw Feb 9 01:07:29.783541 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 01:07:29.783548 kernel: Console: switching to colour frame buffer device 160x50 Feb 9 01:07:29.783555 kernel: fb0: EFI VGA frame buffer device Feb 9 01:07:29.783564 kernel: pstore: Registered efi as persistent store backend Feb 9 01:07:29.783571 kernel: NET: Registered PF_INET6 protocol family Feb 9 01:07:29.783578 kernel: Segment Routing with IPv6 Feb 9 01:07:29.783585 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 01:07:29.783592 kernel: NET: Registered PF_PACKET protocol family Feb 9 01:07:29.783599 kernel: Key type dns_resolver registered Feb 9 01:07:29.783606 kernel: IPI shorthand broadcast: enabled Feb 9 01:07:29.783613 kernel: sched_clock: Marking stable (349460544, 88811562)->(462220734, -23948628) Feb 9 01:07:29.783620 kernel: registered taskstats version 1 Feb 9 01:07:29.783628 kernel: Loading compiled-in X.509 certificates Feb 9 01:07:29.783636 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 01:07:29.783643 kernel: Key type .fscrypt registered Feb 9 01:07:29.783649 kernel: Key type fscrypt-provisioning registered Feb 9 01:07:29.783657 kernel: pstore: Using crash dump compression: deflate Feb 9 01:07:29.783664 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 01:07:29.783672 kernel: ima: Allocated hash algorithm: sha1 Feb 9 01:07:29.783679 kernel: ima: No architecture policies found Feb 9 01:07:29.783686 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 01:07:29.783694 kernel: Write protecting the kernel read-only data: 28672k Feb 9 01:07:29.783714 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 01:07:29.783721 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 01:07:29.783728 kernel: Run /init as init process Feb 9 01:07:29.783737 kernel: with arguments: Feb 9 01:07:29.783744 kernel: /init Feb 9 01:07:29.783751 kernel: with environment: Feb 9 01:07:29.783757 kernel: HOME=/ Feb 9 01:07:29.783764 kernel: TERM=linux Feb 9 01:07:29.783772 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 01:07:29.783781 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 01:07:29.783791 systemd[1]: Detected virtualization kvm. Feb 9 01:07:29.783798 systemd[1]: Detected architecture x86-64. Feb 9 01:07:29.783806 systemd[1]: Running in initrd. Feb 9 01:07:29.783813 systemd[1]: No hostname configured, using default hostname. Feb 9 01:07:29.783821 systemd[1]: Hostname set to . Feb 9 01:07:29.783830 systemd[1]: Initializing machine ID from VM UUID. Feb 9 01:07:29.783837 systemd[1]: Queued start job for default target initrd.target. Feb 9 01:07:29.783852 systemd[1]: Started systemd-ask-password-console.path. Feb 9 01:07:29.783863 systemd[1]: Reached target cryptsetup.target. Feb 9 01:07:29.783882 systemd[1]: Reached target paths.target. Feb 9 01:07:29.783890 systemd[1]: Reached target slices.target. Feb 9 01:07:29.783897 systemd[1]: Reached target swap.target. Feb 9 01:07:29.783905 systemd[1]: Reached target timers.target. Feb 9 01:07:29.783914 systemd[1]: Listening on iscsid.socket. Feb 9 01:07:29.783922 systemd[1]: Listening on iscsiuio.socket. Feb 9 01:07:29.783929 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 01:07:29.783937 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 01:07:29.783945 systemd[1]: Listening on systemd-journald.socket. Feb 9 01:07:29.783957 systemd[1]: Listening on systemd-networkd.socket. Feb 9 01:07:29.783965 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 01:07:29.783972 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 01:07:29.783980 systemd[1]: Reached target sockets.target. Feb 9 01:07:29.783989 systemd[1]: Starting kmod-static-nodes.service... Feb 9 01:07:29.783996 systemd[1]: Finished network-cleanup.service. Feb 9 01:07:29.784004 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 01:07:29.784011 systemd[1]: Starting systemd-journald.service... Feb 9 01:07:29.784019 systemd[1]: Starting systemd-modules-load.service... Feb 9 01:07:29.784027 systemd[1]: Starting systemd-resolved.service... Feb 9 01:07:29.784034 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 01:07:29.784042 systemd[1]: Finished kmod-static-nodes.service. Feb 9 01:07:29.784049 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 01:07:29.784058 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 01:07:29.784065 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 01:07:29.784073 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 01:07:29.784081 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 01:07:29.784089 kernel: audit: type=1130 audit(1707440849.777:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.784099 systemd-journald[197]: Journal started Feb 9 01:07:29.784137 systemd-journald[197]: Runtime Journal (/run/log/journal/cf010f327f414a46a7bf351f45763b16) is 6.0M, max 48.4M, 42.4M free. Feb 9 01:07:29.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.773058 systemd-modules-load[198]: Inserted module 'overlay' Feb 9 01:07:29.785094 systemd[1]: Started systemd-journald.service. Feb 9 01:07:29.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.787890 kernel: audit: type=1130 audit(1707440849.784:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.792327 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 01:07:29.795680 kernel: audit: type=1130 audit(1707440849.791:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.795427 systemd[1]: Starting dracut-cmdline.service... Feb 9 01:07:29.799116 systemd-resolved[199]: Positive Trust Anchors: Feb 9 01:07:29.799644 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 01:07:29.799673 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 01:07:29.803570 systemd-resolved[199]: Defaulting to hostname 'linux'. Feb 9 01:07:29.805322 dracut-cmdline[215]: dracut-dracut-053 Feb 9 01:07:29.805322 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 01:07:29.806295 systemd[1]: Started systemd-resolved.service. Feb 9 01:07:29.811999 kernel: audit: type=1130 audit(1707440849.808:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.811777 systemd[1]: Reached target nss-lookup.target. Feb 9 01:07:29.819892 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 01:07:29.821774 systemd-modules-load[198]: Inserted module 'br_netfilter' Feb 9 01:07:29.822459 kernel: Bridge firewalling registered Feb 9 01:07:29.836887 kernel: SCSI subsystem initialized Feb 9 01:07:29.847141 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 01:07:29.847163 kernel: device-mapper: uevent: version 1.0.3 Feb 9 01:07:29.848083 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 01:07:29.850753 systemd-modules-load[198]: Inserted module 'dm_multipath' Feb 9 01:07:29.851944 systemd[1]: Finished systemd-modules-load.service. Feb 9 01:07:29.855549 kernel: audit: type=1130 audit(1707440849.851:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.852819 systemd[1]: Starting systemd-sysctl.service... Feb 9 01:07:29.860209 systemd[1]: Finished systemd-sysctl.service. Feb 9 01:07:29.863176 kernel: audit: type=1130 audit(1707440849.859:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.865886 kernel: Loading iSCSI transport class v2.0-870. Feb 9 01:07:29.875891 kernel: iscsi: registered transport (tcp) Feb 9 01:07:29.893973 kernel: iscsi: registered transport (qla4xxx) Feb 9 01:07:29.893997 kernel: QLogic iSCSI HBA Driver Feb 9 01:07:29.921544 systemd[1]: Finished dracut-cmdline.service. Feb 9 01:07:29.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.922901 systemd[1]: Starting dracut-pre-udev.service... Feb 9 01:07:29.925532 kernel: audit: type=1130 audit(1707440849.922:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:29.968895 kernel: raid6: avx2x4 gen() 30210 MB/s Feb 9 01:07:29.985892 kernel: raid6: avx2x4 xor() 7455 MB/s Feb 9 01:07:30.002888 kernel: raid6: avx2x2 gen() 32257 MB/s Feb 9 01:07:30.019894 kernel: raid6: avx2x2 xor() 19222 MB/s Feb 9 01:07:30.036887 kernel: raid6: avx2x1 gen() 26510 MB/s Feb 9 01:07:30.053890 kernel: raid6: avx2x1 xor() 15361 MB/s Feb 9 01:07:30.070887 kernel: raid6: sse2x4 gen() 14711 MB/s Feb 9 01:07:30.087894 kernel: raid6: sse2x4 xor() 7278 MB/s Feb 9 01:07:30.104888 kernel: raid6: sse2x2 gen() 16252 MB/s Feb 9 01:07:30.121889 kernel: raid6: sse2x2 xor() 9864 MB/s Feb 9 01:07:30.138892 kernel: raid6: sse2x1 gen() 12421 MB/s Feb 9 01:07:30.156369 kernel: raid6: sse2x1 xor() 7779 MB/s Feb 9 01:07:30.156378 kernel: raid6: using algorithm avx2x2 gen() 32257 MB/s Feb 9 01:07:30.156387 kernel: raid6: .... xor() 19222 MB/s, rmw enabled Feb 9 01:07:30.156395 kernel: raid6: using avx2x2 recovery algorithm Feb 9 01:07:30.167889 kernel: xor: automatically using best checksumming function avx Feb 9 01:07:30.257891 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 01:07:30.265672 systemd[1]: Finished dracut-pre-udev.service. Feb 9 01:07:30.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:30.268000 audit: BPF prog-id=7 op=LOAD Feb 9 01:07:30.269363 kernel: audit: type=1130 audit(1707440850.264:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:30.269393 kernel: audit: type=1334 audit(1707440850.268:10): prog-id=7 op=LOAD Feb 9 01:07:30.268000 audit: BPF prog-id=8 op=LOAD Feb 9 01:07:30.269734 systemd[1]: Starting systemd-udevd.service... Feb 9 01:07:30.281752 systemd-udevd[400]: Using default interface naming scheme 'v252'. Feb 9 01:07:30.286116 systemd[1]: Started systemd-udevd.service. Feb 9 01:07:30.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:30.287393 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 01:07:30.296815 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Feb 9 01:07:30.319551 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 01:07:30.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:30.320630 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 01:07:30.352320 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 01:07:30.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:30.383891 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 01:07:30.387937 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 01:07:30.387963 kernel: GPT:9289727 != 19775487 Feb 9 01:07:30.387973 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 01:07:30.387981 kernel: GPT:9289727 != 19775487 Feb 9 01:07:30.387990 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 01:07:30.387998 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 01:07:30.391885 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 01:07:30.400939 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 01:07:30.400993 kernel: AES CTR mode by8 optimization enabled Feb 9 01:07:30.416890 kernel: libata version 3.00 loaded. Feb 9 01:07:30.420893 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 01:07:30.421033 kernel: scsi host0: ata_piix Feb 9 01:07:30.422807 kernel: scsi host1: ata_piix Feb 9 01:07:30.422974 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 9 01:07:30.422989 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 9 01:07:30.435904 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (443) Feb 9 01:07:30.440266 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 01:07:30.441743 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 01:07:30.446322 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 01:07:30.450455 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 01:07:30.457276 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 01:07:30.459279 systemd[1]: Starting disk-uuid.service... Feb 9 01:07:30.465023 disk-uuid[525]: Primary Header is updated. Feb 9 01:07:30.465023 disk-uuid[525]: Secondary Entries is updated. Feb 9 01:07:30.465023 disk-uuid[525]: Secondary Header is updated. Feb 9 01:07:30.467537 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 01:07:30.582530 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 9 01:07:30.582564 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 9 01:07:30.608894 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 9 01:07:30.609048 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 01:07:30.625891 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 9 01:07:31.472070 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 01:07:31.472123 disk-uuid[526]: The operation has completed successfully. Feb 9 01:07:31.492337 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 01:07:31.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.492412 systemd[1]: Finished disk-uuid.service. Feb 9 01:07:31.500501 systemd[1]: Starting verity-setup.service... Feb 9 01:07:31.511893 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 9 01:07:31.529093 systemd[1]: Found device dev-mapper-usr.device. Feb 9 01:07:31.530828 systemd[1]: Mounting sysusr-usr.mount... Feb 9 01:07:31.533667 systemd[1]: Finished verity-setup.service. Feb 9 01:07:31.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.586892 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 01:07:31.587122 systemd[1]: Mounted sysusr-usr.mount. Feb 9 01:07:31.587535 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 01:07:31.588135 systemd[1]: Starting ignition-setup.service... Feb 9 01:07:31.590293 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 01:07:31.598145 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 01:07:31.598181 kernel: BTRFS info (device vda6): using free space tree Feb 9 01:07:31.598191 kernel: BTRFS info (device vda6): has skinny extents Feb 9 01:07:31.605684 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 01:07:31.612472 systemd[1]: Finished ignition-setup.service. Feb 9 01:07:31.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.613714 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 01:07:31.645570 ignition[625]: Ignition 2.14.0 Feb 9 01:07:31.646354 ignition[625]: Stage: fetch-offline Feb 9 01:07:31.646928 ignition[625]: no configs at "/usr/lib/ignition/base.d" Feb 9 01:07:31.647597 ignition[625]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 01:07:31.648493 ignition[625]: parsed url from cmdline: "" Feb 9 01:07:31.648550 ignition[625]: no config URL provided Feb 9 01:07:31.649117 ignition[625]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 01:07:31.649911 ignition[625]: no config at "/usr/lib/ignition/user.ign" Feb 9 01:07:31.650594 ignition[625]: op(1): [started] loading QEMU firmware config module Feb 9 01:07:31.650616 ignition[625]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 01:07:31.653790 ignition[625]: op(1): [finished] loading QEMU firmware config module Feb 9 01:07:31.654583 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 01:07:31.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.655000 audit: BPF prog-id=9 op=LOAD Feb 9 01:07:31.656821 systemd[1]: Starting systemd-networkd.service... Feb 9 01:07:31.666256 ignition[625]: parsing config with SHA512: 2ca14dcc17cdf82c1eae321e33298f8607e32521f3d4df7146fd7b64cf66a4bdfa3a8d7dacc1df8dec1720d954c716c23559d1f5dda2e76256b55baacc2e663c Feb 9 01:07:31.681831 unknown[625]: fetched base config from "system" Feb 9 01:07:31.681845 unknown[625]: fetched user config from "qemu" Feb 9 01:07:31.682292 ignition[625]: fetch-offline: fetch-offline passed Feb 9 01:07:31.682341 ignition[625]: Ignition finished successfully Feb 9 01:07:31.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.683560 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 01:07:31.684803 systemd-networkd[708]: lo: Link UP Feb 9 01:07:31.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.684806 systemd-networkd[708]: lo: Gained carrier Feb 9 01:07:31.685188 systemd-networkd[708]: Enumeration completed Feb 9 01:07:31.685292 systemd[1]: Started systemd-networkd.service. Feb 9 01:07:31.685366 systemd-networkd[708]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 01:07:31.685988 systemd-networkd[708]: eth0: Link UP Feb 9 01:07:31.685992 systemd-networkd[708]: eth0: Gained carrier Feb 9 01:07:31.686360 systemd[1]: Reached target network.target. Feb 9 01:07:31.686952 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 01:07:31.687673 systemd[1]: Starting ignition-kargs.service... Feb 9 01:07:31.689021 systemd[1]: Starting iscsiuio.service... Feb 9 01:07:31.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.693104 systemd[1]: Started iscsiuio.service. Feb 9 01:07:31.695615 systemd[1]: Starting iscsid.service... Feb 9 01:07:31.696482 ignition[710]: Ignition 2.14.0 Feb 9 01:07:31.696488 ignition[710]: Stage: kargs Feb 9 01:07:31.696570 ignition[710]: no configs at "/usr/lib/ignition/base.d" Feb 9 01:07:31.696579 ignition[710]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 01:07:31.697502 ignition[710]: kargs: kargs passed Feb 9 01:07:31.697625 ignition[710]: Ignition finished successfully Feb 9 01:07:31.699674 systemd[1]: Finished ignition-kargs.service. Feb 9 01:07:31.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.701322 systemd[1]: Starting ignition-disks.service... Feb 9 01:07:31.702805 systemd-networkd[708]: eth0: DHCPv4 address 10.0.0.4/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 01:07:31.705962 iscsid[719]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 01:07:31.705962 iscsid[719]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 01:07:31.705962 iscsid[719]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 01:07:31.705962 iscsid[719]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 01:07:31.705962 iscsid[719]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 01:07:31.705962 iscsid[719]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 01:07:31.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.709254 systemd[1]: Finished ignition-disks.service. Feb 9 01:07:31.707466 ignition[720]: Ignition 2.14.0 Feb 9 01:07:31.710879 systemd[1]: Reached target initrd-root-device.target. Feb 9 01:07:31.707471 ignition[720]: Stage: disks Feb 9 01:07:31.712238 systemd[1]: Reached target local-fs-pre.target. Feb 9 01:07:31.707537 ignition[720]: no configs at "/usr/lib/ignition/base.d" Feb 9 01:07:31.713511 systemd[1]: Reached target local-fs.target. Feb 9 01:07:31.707545 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 01:07:31.714878 systemd[1]: Reached target sysinit.target. Feb 9 01:07:31.708385 ignition[720]: disks: disks passed Feb 9 01:07:31.716202 systemd[1]: Reached target basic.target. Feb 9 01:07:31.708411 ignition[720]: Ignition finished successfully Feb 9 01:07:31.723182 systemd[1]: Started iscsid.service. Feb 9 01:07:31.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.724110 systemd[1]: Starting dracut-initqueue.service... Feb 9 01:07:31.733239 systemd[1]: Finished dracut-initqueue.service. Feb 9 01:07:31.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.733616 systemd[1]: Reached target remote-fs-pre.target. Feb 9 01:07:31.733784 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 01:07:31.735885 systemd[1]: Reached target remote-fs.target. Feb 9 01:07:31.737474 systemd[1]: Starting dracut-pre-mount.service... Feb 9 01:07:31.744395 systemd[1]: Finished dracut-pre-mount.service. Feb 9 01:07:31.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.745291 systemd[1]: Starting systemd-fsck-root.service... Feb 9 01:07:31.754907 systemd-fsck[741]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 01:07:31.759228 systemd[1]: Finished systemd-fsck-root.service. Feb 9 01:07:31.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.760262 systemd[1]: Mounting sysroot.mount... Feb 9 01:07:31.765891 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 01:07:31.766194 systemd[1]: Mounted sysroot.mount. Feb 9 01:07:31.766558 systemd[1]: Reached target initrd-root-fs.target. Feb 9 01:07:31.767713 systemd[1]: Mounting sysroot-usr.mount... Feb 9 01:07:31.768466 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 01:07:31.768493 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 01:07:31.768512 systemd[1]: Reached target ignition-diskful.target. Feb 9 01:07:31.769980 systemd[1]: Mounted sysroot-usr.mount. Feb 9 01:07:31.772040 systemd[1]: Starting initrd-setup-root.service... Feb 9 01:07:31.776084 initrd-setup-root[751]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 01:07:31.779094 initrd-setup-root[759]: cut: /sysroot/etc/group: No such file or directory Feb 9 01:07:31.781627 initrd-setup-root[767]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 01:07:31.784158 initrd-setup-root[775]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 01:07:31.806934 systemd[1]: Finished initrd-setup-root.service. Feb 9 01:07:31.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.808843 systemd[1]: Starting ignition-mount.service... Feb 9 01:07:31.810400 systemd[1]: Starting sysroot-boot.service... Feb 9 01:07:31.813316 bash[792]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 01:07:31.821121 ignition[793]: INFO : Ignition 2.14.0 Feb 9 01:07:31.821121 ignition[793]: INFO : Stage: mount Feb 9 01:07:31.822266 ignition[793]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 01:07:31.822266 ignition[793]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 01:07:31.822266 ignition[793]: INFO : mount: mount passed Feb 9 01:07:31.822266 ignition[793]: INFO : Ignition finished successfully Feb 9 01:07:31.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:31.822688 systemd[1]: Finished ignition-mount.service. Feb 9 01:07:31.829693 systemd[1]: Finished sysroot-boot.service. Feb 9 01:07:31.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:32.538823 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 01:07:32.544573 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (802) Feb 9 01:07:32.544600 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 01:07:32.544610 kernel: BTRFS info (device vda6): using free space tree Feb 9 01:07:32.545889 kernel: BTRFS info (device vda6): has skinny extents Feb 9 01:07:32.548421 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 01:07:32.549470 systemd[1]: Starting ignition-files.service... Feb 9 01:07:32.561919 ignition[822]: INFO : Ignition 2.14.0 Feb 9 01:07:32.561919 ignition[822]: INFO : Stage: files Feb 9 01:07:32.563074 ignition[822]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 01:07:32.563074 ignition[822]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 01:07:32.563074 ignition[822]: DEBUG : files: compiled without relabeling support, skipping Feb 9 01:07:32.565813 ignition[822]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 01:07:32.565813 ignition[822]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 01:07:32.567943 ignition[822]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 01:07:32.569047 ignition[822]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 01:07:32.570050 ignition[822]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 01:07:32.569594 unknown[822]: wrote ssh authorized keys file for user: core Feb 9 01:07:32.571908 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 01:07:32.571908 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 01:07:32.943447 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 01:07:33.110558 ignition[822]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 01:07:33.112606 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 01:07:33.112606 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 01:07:33.112606 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 01:07:33.388056 systemd-networkd[708]: eth0: Gained IPv6LL Feb 9 01:07:33.421791 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 01:07:33.497780 ignition[822]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 01:07:33.499886 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 01:07:33.499886 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 01:07:33.499886 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 01:07:33.575315 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 01:07:33.758284 ignition[822]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 01:07:33.760320 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 01:07:33.760320 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 01:07:33.760320 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 01:07:33.804785 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 01:07:34.357850 ignition[822]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 01:07:34.360246 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 01:07:34.360246 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 01:07:34.360246 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 01:07:34.360246 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 01:07:34.360246 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 01:07:34.360246 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 01:07:34.360246 ignition[822]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Feb 9 01:07:34.360246 ignition[822]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 01:07:34.389636 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 9 01:07:34.389660 kernel: audit: type=1130 audit(1707440854.379:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.379046 systemd[1]: Finished ignition-files.service. Feb 9 01:07:34.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(10): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(11): [started] setting preset to enabled for "prepare-critools.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(12): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(12): op(13): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(12): op(13): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: op(12): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 01:07:34.393222 ignition[822]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 01:07:34.393222 ignition[822]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 01:07:34.393222 ignition[822]: INFO : files: files passed Feb 9 01:07:34.393222 ignition[822]: INFO : Ignition finished successfully Feb 9 01:07:34.418996 kernel: audit: type=1130 audit(1707440854.389:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.419510 kernel: audit: type=1130 audit(1707440854.393:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.419521 kernel: audit: type=1131 audit(1707440854.393:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.419531 kernel: audit: type=1130 audit(1707440854.411:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.419541 kernel: audit: type=1131 audit(1707440854.411:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.381247 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 01:07:34.385069 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 01:07:34.421857 initrd-setup-root-after-ignition[845]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 01:07:34.385795 systemd[1]: Starting ignition-quench.service... Feb 9 01:07:34.423634 initrd-setup-root-after-ignition[848]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 01:07:34.387631 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 01:07:34.389814 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 01:07:34.389896 systemd[1]: Finished ignition-quench.service. Feb 9 01:07:34.393266 systemd[1]: Reached target ignition-complete.target. Feb 9 01:07:34.399885 systemd[1]: Starting initrd-parse-etc.service... Feb 9 01:07:34.409846 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 01:07:34.432524 kernel: audit: type=1130 audit(1707440854.429:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.409924 systemd[1]: Finished initrd-parse-etc.service. Feb 9 01:07:34.411267 systemd[1]: Reached target initrd-fs.target. Feb 9 01:07:34.417217 systemd[1]: Reached target initrd.target. Feb 9 01:07:34.418337 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 01:07:34.418956 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 01:07:34.427839 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 01:07:34.429950 systemd[1]: Starting initrd-cleanup.service... Feb 9 01:07:34.436913 systemd[1]: Stopped target nss-lookup.target. Feb 9 01:07:34.437776 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 01:07:34.438940 systemd[1]: Stopped target timers.target. Feb 9 01:07:34.440043 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 01:07:34.444180 kernel: audit: type=1131 audit(1707440854.440:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.440129 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 01:07:34.441192 systemd[1]: Stopped target initrd.target. Feb 9 01:07:34.444252 systemd[1]: Stopped target basic.target. Feb 9 01:07:34.445357 systemd[1]: Stopped target ignition-complete.target. Feb 9 01:07:34.446476 systemd[1]: Stopped target ignition-diskful.target. Feb 9 01:07:34.447583 systemd[1]: Stopped target initrd-root-device.target. Feb 9 01:07:34.448804 systemd[1]: Stopped target remote-fs.target. Feb 9 01:07:34.449961 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 01:07:34.451146 systemd[1]: Stopped target sysinit.target. Feb 9 01:07:34.452211 systemd[1]: Stopped target local-fs.target. Feb 9 01:07:34.453326 systemd[1]: Stopped target local-fs-pre.target. Feb 9 01:07:34.454416 systemd[1]: Stopped target swap.target. Feb 9 01:07:34.459587 kernel: audit: type=1131 audit(1707440854.455:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.455473 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 01:07:34.455558 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 01:07:34.463954 kernel: audit: type=1131 audit(1707440854.460:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.456717 systemd[1]: Stopped target cryptsetup.target. Feb 9 01:07:34.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.459635 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 01:07:34.459719 systemd[1]: Stopped dracut-initqueue.service. Feb 9 01:07:34.460973 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 01:07:34.461056 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 01:07:34.464070 systemd[1]: Stopped target paths.target. Feb 9 01:07:34.465094 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 01:07:34.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.465201 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 01:07:34.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.466536 systemd[1]: Stopped target slices.target. Feb 9 01:07:34.467526 systemd[1]: Stopped target sockets.target. Feb 9 01:07:34.468785 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 01:07:34.468864 systemd[1]: Closed iscsid.socket. Feb 9 01:07:34.469889 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 01:07:34.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.469987 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 01:07:34.471063 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 01:07:34.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.480456 ignition[862]: INFO : Ignition 2.14.0 Feb 9 01:07:34.480456 ignition[862]: INFO : Stage: umount Feb 9 01:07:34.480456 ignition[862]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 01:07:34.480456 ignition[862]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 01:07:34.480456 ignition[862]: INFO : umount: umount passed Feb 9 01:07:34.480456 ignition[862]: INFO : Ignition finished successfully Feb 9 01:07:34.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.471148 systemd[1]: Stopped ignition-files.service. Feb 9 01:07:34.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.473021 systemd[1]: Stopping ignition-mount.service... Feb 9 01:07:34.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.474085 systemd[1]: Stopping iscsiuio.service... Feb 9 01:07:34.474866 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 01:07:34.474995 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 01:07:34.476741 systemd[1]: Stopping sysroot-boot.service... Feb 9 01:07:34.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.477887 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 01:07:34.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.478019 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 01:07:34.479240 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 01:07:34.479320 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 01:07:34.482012 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 01:07:34.482088 systemd[1]: Stopped iscsiuio.service. Feb 9 01:07:34.483174 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 01:07:34.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.483235 systemd[1]: Stopped ignition-mount.service. Feb 9 01:07:34.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.484540 systemd[1]: Stopped target network.target. Feb 9 01:07:34.485383 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 01:07:34.485412 systemd[1]: Closed iscsiuio.socket. Feb 9 01:07:34.486476 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 01:07:34.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.486506 systemd[1]: Stopped ignition-disks.service. Feb 9 01:07:34.487131 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 01:07:34.487161 systemd[1]: Stopped ignition-kargs.service. Feb 9 01:07:34.488218 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 01:07:34.488248 systemd[1]: Stopped ignition-setup.service. Feb 9 01:07:34.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.511000 audit: BPF prog-id=6 op=UNLOAD Feb 9 01:07:34.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.488940 systemd[1]: Stopping systemd-networkd.service... Feb 9 01:07:34.490112 systemd[1]: Stopping systemd-resolved.service... Feb 9 01:07:34.491867 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 01:07:34.492271 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 01:07:34.492343 systemd[1]: Finished initrd-cleanup.service. Feb 9 01:07:34.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.492833 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 01:07:34.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.492914 systemd-networkd[708]: eth0: DHCPv6 lease lost Feb 9 01:07:34.519000 audit: BPF prog-id=9 op=UNLOAD Feb 9 01:07:34.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.492984 systemd[1]: Stopped sysroot-boot.service. Feb 9 01:07:34.494165 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 01:07:34.494228 systemd[1]: Stopped systemd-networkd.service. Feb 9 01:07:34.497578 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 01:07:34.497602 systemd[1]: Closed systemd-networkd.socket. Feb 9 01:07:34.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:34.498691 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 01:07:34.498722 systemd[1]: Stopped initrd-setup-root.service. Feb 9 01:07:34.500283 systemd[1]: Stopping network-cleanup.service... Feb 9 01:07:34.500904 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 01:07:34.500942 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 01:07:34.501324 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 01:07:34.501354 systemd[1]: Stopped systemd-sysctl.service. Feb 9 01:07:34.502125 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 01:07:34.502153 systemd[1]: Stopped systemd-modules-load.service. Feb 9 01:07:34.503244 systemd[1]: Stopping systemd-udevd.service... Feb 9 01:07:34.504847 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 01:07:34.505212 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 01:07:34.505282 systemd[1]: Stopped systemd-resolved.service. Feb 9 01:07:34.509560 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 01:07:34.509640 systemd[1]: Stopped network-cleanup.service. Feb 9 01:07:34.510851 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 01:07:34.511014 systemd[1]: Stopped systemd-udevd.service. Feb 9 01:07:34.512590 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 01:07:34.512619 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 01:07:34.513687 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 01:07:34.513711 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 01:07:34.514915 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 01:07:34.514948 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 01:07:34.516137 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 01:07:34.516166 systemd[1]: Stopped dracut-cmdline.service. Feb 9 01:07:34.517233 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 01:07:34.517263 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 01:07:34.518026 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 01:07:34.519046 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 01:07:34.519081 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 01:07:34.522515 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 01:07:34.522580 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 01:07:34.523589 systemd[1]: Reached target initrd-switch-root.target. Feb 9 01:07:34.525215 systemd[1]: Starting initrd-switch-root.service... Feb 9 01:07:34.540764 systemd[1]: Switching root. Feb 9 01:07:34.559189 iscsid[719]: iscsid shutting down. Feb 9 01:07:34.559707 systemd-journald[197]: Journal stopped Feb 9 01:07:37.144229 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Feb 9 01:07:37.144278 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 01:07:37.144292 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 01:07:37.144301 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 01:07:37.144311 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 01:07:37.144320 kernel: SELinux: policy capability open_perms=1 Feb 9 01:07:37.144330 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 01:07:37.144343 kernel: SELinux: policy capability always_check_network=0 Feb 9 01:07:37.144352 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 01:07:37.144364 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 01:07:37.144374 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 01:07:37.144383 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 01:07:37.144393 systemd[1]: Successfully loaded SELinux policy in 36.482ms. Feb 9 01:07:37.144410 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.540ms. Feb 9 01:07:37.144422 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 01:07:37.144434 systemd[1]: Detected virtualization kvm. Feb 9 01:07:37.144444 systemd[1]: Detected architecture x86-64. Feb 9 01:07:37.144454 systemd[1]: Detected first boot. Feb 9 01:07:37.144465 systemd[1]: Initializing machine ID from VM UUID. Feb 9 01:07:37.144475 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 01:07:37.144486 systemd[1]: Populated /etc with preset unit settings. Feb 9 01:07:37.144496 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 01:07:37.144507 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 01:07:37.144520 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 01:07:37.144531 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 01:07:37.144541 systemd[1]: Stopped iscsid.service. Feb 9 01:07:37.144551 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 01:07:37.144561 systemd[1]: Stopped initrd-switch-root.service. Feb 9 01:07:37.144575 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 01:07:37.144586 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 01:07:37.144596 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 01:07:37.144609 systemd[1]: Created slice system-getty.slice. Feb 9 01:07:37.144618 systemd[1]: Created slice system-modprobe.slice. Feb 9 01:07:37.144629 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 01:07:37.144638 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 01:07:37.144649 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 01:07:37.144660 systemd[1]: Created slice user.slice. Feb 9 01:07:37.144670 systemd[1]: Started systemd-ask-password-console.path. Feb 9 01:07:37.144680 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 01:07:37.144691 systemd[1]: Set up automount boot.automount. Feb 9 01:07:37.144702 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 01:07:37.144712 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 01:07:37.144723 systemd[1]: Stopped target initrd-fs.target. Feb 9 01:07:37.144733 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 01:07:37.144752 systemd[1]: Reached target integritysetup.target. Feb 9 01:07:37.144763 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 01:07:37.144776 systemd[1]: Reached target remote-fs.target. Feb 9 01:07:37.144786 systemd[1]: Reached target slices.target. Feb 9 01:07:37.144797 systemd[1]: Reached target swap.target. Feb 9 01:07:37.144807 systemd[1]: Reached target torcx.target. Feb 9 01:07:37.144817 systemd[1]: Reached target veritysetup.target. Feb 9 01:07:37.144828 systemd[1]: Listening on systemd-coredump.socket. Feb 9 01:07:37.144838 systemd[1]: Listening on systemd-initctl.socket. Feb 9 01:07:37.144849 systemd[1]: Listening on systemd-networkd.socket. Feb 9 01:07:37.144860 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 01:07:37.144885 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 01:07:37.144895 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 01:07:37.144906 systemd[1]: Mounting dev-hugepages.mount... Feb 9 01:07:37.144917 systemd[1]: Mounting dev-mqueue.mount... Feb 9 01:07:37.144927 systemd[1]: Mounting media.mount... Feb 9 01:07:37.144938 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 01:07:37.144948 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 01:07:37.144959 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 01:07:37.144969 systemd[1]: Mounting tmp.mount... Feb 9 01:07:37.144980 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 01:07:37.144990 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 01:07:37.145000 systemd[1]: Starting kmod-static-nodes.service... Feb 9 01:07:37.145011 systemd[1]: Starting modprobe@configfs.service... Feb 9 01:07:37.145022 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 01:07:37.145031 systemd[1]: Starting modprobe@drm.service... Feb 9 01:07:37.145041 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 01:07:37.145053 systemd[1]: Starting modprobe@fuse.service... Feb 9 01:07:37.145063 systemd[1]: Starting modprobe@loop.service... Feb 9 01:07:37.145073 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 01:07:37.145084 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 01:07:37.145094 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 01:07:37.145106 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 01:07:37.145117 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 01:07:37.145126 systemd[1]: Stopped systemd-journald.service. Feb 9 01:07:37.145137 kernel: loop: module loaded Feb 9 01:07:37.145146 systemd[1]: Starting systemd-journald.service... Feb 9 01:07:37.145157 kernel: fuse: init (API version 7.34) Feb 9 01:07:37.145167 systemd[1]: Starting systemd-modules-load.service... Feb 9 01:07:37.145177 systemd[1]: Starting systemd-network-generator.service... Feb 9 01:07:37.145187 systemd[1]: Starting systemd-remount-fs.service... Feb 9 01:07:37.145199 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 01:07:37.145209 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 01:07:37.145219 systemd[1]: Stopped verity-setup.service. Feb 9 01:07:37.145230 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 01:07:37.145240 systemd[1]: Mounted dev-hugepages.mount. Feb 9 01:07:37.145250 systemd[1]: Mounted dev-mqueue.mount. Feb 9 01:07:37.145263 systemd-journald[965]: Journal started Feb 9 01:07:37.145300 systemd-journald[965]: Runtime Journal (/run/log/journal/cf010f327f414a46a7bf351f45763b16) is 6.0M, max 48.4M, 42.4M free. Feb 9 01:07:34.613000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 01:07:35.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 01:07:35.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 01:07:35.019000 audit: BPF prog-id=10 op=LOAD Feb 9 01:07:35.019000 audit: BPF prog-id=10 op=UNLOAD Feb 9 01:07:35.019000 audit: BPF prog-id=11 op=LOAD Feb 9 01:07:35.019000 audit: BPF prog-id=11 op=UNLOAD Feb 9 01:07:35.048000 audit[896]: AVC avc: denied { associate } for pid=896 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 01:07:35.048000 audit[896]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=879 pid=896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:35.048000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 01:07:35.049000 audit[896]: AVC avc: denied { associate } for pid=896 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 01:07:35.049000 audit[896]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059b9 a2=1ed a3=0 items=2 ppid=879 pid=896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:35.049000 audit: CWD cwd="/" Feb 9 01:07:35.049000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:35.049000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:35.049000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 01:07:37.043000 audit: BPF prog-id=12 op=LOAD Feb 9 01:07:37.043000 audit: BPF prog-id=3 op=UNLOAD Feb 9 01:07:37.043000 audit: BPF prog-id=13 op=LOAD Feb 9 01:07:37.043000 audit: BPF prog-id=14 op=LOAD Feb 9 01:07:37.043000 audit: BPF prog-id=4 op=UNLOAD Feb 9 01:07:37.043000 audit: BPF prog-id=5 op=UNLOAD Feb 9 01:07:37.044000 audit: BPF prog-id=15 op=LOAD Feb 9 01:07:37.044000 audit: BPF prog-id=12 op=UNLOAD Feb 9 01:07:37.044000 audit: BPF prog-id=16 op=LOAD Feb 9 01:07:37.044000 audit: BPF prog-id=17 op=LOAD Feb 9 01:07:37.044000 audit: BPF prog-id=13 op=UNLOAD Feb 9 01:07:37.044000 audit: BPF prog-id=14 op=UNLOAD Feb 9 01:07:37.044000 audit: BPF prog-id=18 op=LOAD Feb 9 01:07:37.044000 audit: BPF prog-id=15 op=UNLOAD Feb 9 01:07:37.044000 audit: BPF prog-id=19 op=LOAD Feb 9 01:07:37.045000 audit: BPF prog-id=20 op=LOAD Feb 9 01:07:37.045000 audit: BPF prog-id=16 op=UNLOAD Feb 9 01:07:37.045000 audit: BPF prog-id=17 op=UNLOAD Feb 9 01:07:37.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.146045 systemd[1]: Started systemd-journald.service. Feb 9 01:07:37.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.053000 audit: BPF prog-id=18 op=UNLOAD Feb 9 01:07:37.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.125000 audit: BPF prog-id=21 op=LOAD Feb 9 01:07:37.125000 audit: BPF prog-id=22 op=LOAD Feb 9 01:07:37.125000 audit: BPF prog-id=23 op=LOAD Feb 9 01:07:37.125000 audit: BPF prog-id=19 op=UNLOAD Feb 9 01:07:37.125000 audit: BPF prog-id=20 op=UNLOAD Feb 9 01:07:37.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.142000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 01:07:37.142000 audit[965]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcd9c5b8e0 a2=4000 a3=7ffcd9c5b97c items=0 ppid=1 pid=965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:37.142000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 01:07:35.047979 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 01:07:37.042603 systemd[1]: Queued start job for default target multi-user.target. Feb 9 01:07:35.048156 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 01:07:37.042613 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 01:07:37.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:35.048173 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 01:07:37.046292 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 01:07:35.048199 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 01:07:37.146732 systemd[1]: Mounted media.mount. Feb 9 01:07:35.048209 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 01:07:35.048233 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 01:07:35.048246 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 01:07:35.048428 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 01:07:35.048462 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 01:07:35.048475 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 01:07:35.048782 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 01:07:35.048827 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 01:07:37.147446 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 01:07:35.048846 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 01:07:35.048859 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 01:07:35.048887 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 01:07:35.048899 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 01:07:36.801664 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 01:07:36.801947 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 01:07:36.802028 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 01:07:36.802177 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 01:07:37.148214 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 01:07:36.802224 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 01:07:36.802279 /usr/lib/systemd/system-generators/torcx-generator[896]: time="2024-02-09T01:07:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 01:07:37.148916 systemd[1]: Mounted tmp.mount. Feb 9 01:07:37.149639 systemd[1]: Finished kmod-static-nodes.service. Feb 9 01:07:37.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.150415 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 01:07:37.150588 systemd[1]: Finished modprobe@configfs.service. Feb 9 01:07:37.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.151378 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 01:07:37.151528 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 01:07:37.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.153823 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 01:07:37.154093 systemd[1]: Finished modprobe@drm.service. Feb 9 01:07:37.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.154879 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 01:07:37.155020 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 01:07:37.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.155836 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 01:07:37.155992 systemd[1]: Finished modprobe@fuse.service. Feb 9 01:07:37.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.156761 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 01:07:37.156983 systemd[1]: Finished modprobe@loop.service. Feb 9 01:07:37.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.158038 systemd[1]: Finished systemd-modules-load.service. Feb 9 01:07:37.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.159033 systemd[1]: Finished systemd-network-generator.service. Feb 9 01:07:37.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.160106 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 01:07:37.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.161024 systemd[1]: Finished systemd-remount-fs.service. Feb 9 01:07:37.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.162076 systemd[1]: Reached target network-pre.target. Feb 9 01:07:37.163738 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 01:07:37.165468 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 01:07:37.166035 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 01:07:37.167214 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 01:07:37.168689 systemd[1]: Starting systemd-journal-flush.service... Feb 9 01:07:37.169324 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 01:07:37.170219 systemd[1]: Starting systemd-random-seed.service... Feb 9 01:07:37.170844 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 01:07:37.171742 systemd[1]: Starting systemd-sysctl.service... Feb 9 01:07:37.173257 systemd[1]: Starting systemd-sysusers.service... Feb 9 01:07:37.176001 systemd-journald[965]: Time spent on flushing to /var/log/journal/cf010f327f414a46a7bf351f45763b16 is 20.080ms for 1171 entries. Feb 9 01:07:37.176001 systemd-journald[965]: System Journal (/var/log/journal/cf010f327f414a46a7bf351f45763b16) is 8.0M, max 195.6M, 187.6M free. Feb 9 01:07:37.210018 systemd-journald[965]: Received client request to flush runtime journal. Feb 9 01:07:37.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.175778 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 01:07:37.177530 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 01:07:37.178632 systemd[1]: Finished systemd-random-seed.service. Feb 9 01:07:37.179420 systemd[1]: Reached target first-boot-complete.target. Feb 9 01:07:37.185912 systemd[1]: Finished systemd-sysctl.service. Feb 9 01:07:37.196090 systemd[1]: Finished systemd-sysusers.service. Feb 9 01:07:37.209199 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 01:07:37.210689 systemd[1]: Starting systemd-udev-settle.service... Feb 9 01:07:37.211445 systemd[1]: Finished systemd-journal-flush.service. Feb 9 01:07:37.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.216330 udevadm[1001]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 01:07:37.564744 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 01:07:37.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.564000 audit: BPF prog-id=24 op=LOAD Feb 9 01:07:37.565000 audit: BPF prog-id=25 op=LOAD Feb 9 01:07:37.565000 audit: BPF prog-id=7 op=UNLOAD Feb 9 01:07:37.565000 audit: BPF prog-id=8 op=UNLOAD Feb 9 01:07:37.566488 systemd[1]: Starting systemd-udevd.service... Feb 9 01:07:37.581956 systemd-udevd[1002]: Using default interface naming scheme 'v252'. Feb 9 01:07:37.593195 systemd[1]: Started systemd-udevd.service. Feb 9 01:07:37.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.593000 audit: BPF prog-id=26 op=LOAD Feb 9 01:07:37.595525 systemd[1]: Starting systemd-networkd.service... Feb 9 01:07:37.602000 audit: BPF prog-id=27 op=LOAD Feb 9 01:07:37.602000 audit: BPF prog-id=28 op=LOAD Feb 9 01:07:37.602000 audit: BPF prog-id=29 op=LOAD Feb 9 01:07:37.603681 systemd[1]: Starting systemd-userdbd.service... Feb 9 01:07:37.628486 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 01:07:37.629530 systemd[1]: Started systemd-userdbd.service. Feb 9 01:07:37.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.647893 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 01:07:37.654893 kernel: ACPI: button: Power Button [PWRF] Feb 9 01:07:37.657000 audit[1007]: AVC avc: denied { confidentiality } for pid=1007 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 01:07:37.666404 systemd-networkd[1012]: lo: Link UP Feb 9 01:07:37.666656 systemd-networkd[1012]: lo: Gained carrier Feb 9 01:07:37.667180 systemd-networkd[1012]: Enumeration completed Feb 9 01:07:37.657000 audit[1007]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558944382030 a1=32194 a2=7f6f7df78bc5 a3=5 items=108 ppid=1002 pid=1007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:37.657000 audit: CWD cwd="/" Feb 9 01:07:37.657000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=1 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=2 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=3 name=(null) inode=11171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=4 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=5 name=(null) inode=11172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=6 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=7 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=8 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=9 name=(null) inode=11174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=10 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=11 name=(null) inode=11175 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=12 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=13 name=(null) inode=11176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=14 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=15 name=(null) inode=11177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=16 name=(null) inode=11173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=17 name=(null) inode=11178 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=18 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=19 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=20 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=21 name=(null) inode=11180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=22 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=23 name=(null) inode=11181 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=24 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=25 name=(null) inode=11182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=26 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=27 name=(null) inode=11183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=28 name=(null) inode=11179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=29 name=(null) inode=11184 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=30 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=31 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=32 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=33 name=(null) inode=11186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=34 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=35 name=(null) inode=11187 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=36 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=37 name=(null) inode=11188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=38 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=39 name=(null) inode=11189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=40 name=(null) inode=11185 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=41 name=(null) inode=11190 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=42 name=(null) inode=11170 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=43 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=44 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=45 name=(null) inode=11192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=46 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=47 name=(null) inode=11193 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=48 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=49 name=(null) inode=11194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=50 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=51 name=(null) inode=11195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=52 name=(null) inode=11191 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=53 name=(null) inode=11196 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=55 name=(null) inode=11197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=56 name=(null) inode=11197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=57 name=(null) inode=11198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=58 name=(null) inode=11197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=59 name=(null) inode=11199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=60 name=(null) inode=11197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=61 name=(null) inode=11200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=62 name=(null) inode=11200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=63 name=(null) inode=11201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=64 name=(null) inode=11200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=65 name=(null) inode=11202 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=66 name=(null) inode=11200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=67 name=(null) inode=11203 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=68 name=(null) inode=11200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=69 name=(null) inode=11204 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=70 name=(null) inode=11200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=71 name=(null) inode=11205 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=72 name=(null) inode=11197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=73 name=(null) inode=11206 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=74 name=(null) inode=11206 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=75 name=(null) inode=11207 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=76 name=(null) inode=11206 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=77 name=(null) inode=11208 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=78 name=(null) inode=11206 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=79 name=(null) inode=11209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=80 name=(null) inode=11206 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=81 name=(null) inode=11210 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=82 name=(null) inode=11206 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=83 name=(null) inode=11211 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=84 name=(null) inode=11197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=85 name=(null) inode=11212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=86 name=(null) inode=11212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=87 name=(null) inode=11213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=88 name=(null) inode=11212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=89 name=(null) inode=11214 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=90 name=(null) inode=11212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=91 name=(null) inode=11215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=92 name=(null) inode=11212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=93 name=(null) inode=11216 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=94 name=(null) inode=11212 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=95 name=(null) inode=11217 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=96 name=(null) inode=11197 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=97 name=(null) inode=11218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=98 name=(null) inode=11218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=99 name=(null) inode=11219 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=100 name=(null) inode=11218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=101 name=(null) inode=11220 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=102 name=(null) inode=11218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=103 name=(null) inode=11221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=104 name=(null) inode=11218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=105 name=(null) inode=11222 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=106 name=(null) inode=11218 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PATH item=107 name=(null) inode=11223 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:07:37.657000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 01:07:37.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.667359 systemd[1]: Started systemd-networkd.service. Feb 9 01:07:37.668060 systemd-networkd[1012]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 01:07:37.668816 systemd-networkd[1012]: eth0: Link UP Feb 9 01:07:37.668819 systemd-networkd[1012]: eth0: Gained carrier Feb 9 01:07:37.686890 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Feb 9 01:07:37.686985 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 01:07:37.687971 systemd-networkd[1012]: eth0: DHCPv4 address 10.0.0.4/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 01:07:37.695895 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 01:07:37.712895 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 01:07:37.738997 kernel: kvm: Nested Virtualization enabled Feb 9 01:07:37.739032 kernel: SVM: kvm: Nested Paging enabled Feb 9 01:07:37.739054 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 9 01:07:37.739903 kernel: SVM: Virtual GIF supported Feb 9 01:07:37.753893 kernel: EDAC MC: Ver: 3.0.0 Feb 9 01:07:37.773164 systemd[1]: Finished systemd-udev-settle.service. Feb 9 01:07:37.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.774941 systemd[1]: Starting lvm2-activation-early.service... Feb 9 01:07:37.782294 lvm[1038]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 01:07:37.809468 systemd[1]: Finished lvm2-activation-early.service. Feb 9 01:07:37.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.810203 systemd[1]: Reached target cryptsetup.target. Feb 9 01:07:37.811559 systemd[1]: Starting lvm2-activation.service... Feb 9 01:07:37.815196 lvm[1039]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 01:07:37.840477 systemd[1]: Finished lvm2-activation.service. Feb 9 01:07:37.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.841160 systemd[1]: Reached target local-fs-pre.target. Feb 9 01:07:37.841788 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 01:07:37.841806 systemd[1]: Reached target local-fs.target. Feb 9 01:07:37.842382 systemd[1]: Reached target machines.target. Feb 9 01:07:37.843741 systemd[1]: Starting ldconfig.service... Feb 9 01:07:37.844445 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 01:07:37.844500 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 01:07:37.845321 systemd[1]: Starting systemd-boot-update.service... Feb 9 01:07:37.846645 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 01:07:37.848254 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 01:07:37.849272 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 01:07:37.849301 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 01:07:37.852454 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 01:07:37.852858 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1041 (bootctl) Feb 9 01:07:37.853782 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 01:07:37.858610 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 01:07:37.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.866909 systemd-tmpfiles[1045]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 01:07:37.868134 systemd-tmpfiles[1045]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 01:07:37.870799 systemd-tmpfiles[1045]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 01:07:37.881800 systemd-fsck[1050]: fsck.fat 4.2 (2021-01-31) Feb 9 01:07:37.881800 systemd-fsck[1050]: /dev/vda1: 790 files, 115355/258078 clusters Feb 9 01:07:37.884304 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 01:07:37.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:37.886590 systemd[1]: Mounting boot.mount... Feb 9 01:07:37.901284 systemd[1]: Mounted boot.mount. Feb 9 01:07:38.086028 systemd[1]: Finished systemd-boot-update.service. Feb 9 01:07:38.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:38.092785 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 01:07:38.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:38.117019 ldconfig[1040]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 01:07:38.121468 systemd[1]: Finished ldconfig.service. Feb 9 01:07:38.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:38.132991 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 01:07:38.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:38.134860 systemd[1]: Starting audit-rules.service... Feb 9 01:07:38.136210 systemd[1]: Starting clean-ca-certificates.service... Feb 9 01:07:38.138018 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 01:07:38.138000 audit: BPF prog-id=30 op=LOAD Feb 9 01:07:38.140016 systemd[1]: Starting systemd-resolved.service... Feb 9 01:07:38.140000 audit: BPF prog-id=31 op=LOAD Feb 9 01:07:38.141998 systemd[1]: Starting systemd-timesyncd.service... Feb 9 01:07:38.143365 systemd[1]: Starting systemd-update-utmp.service... Feb 9 01:07:38.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:38.147000 audit[1064]: SYSTEM_BOOT pid=1064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 01:07:38.145007 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 01:07:38.145686 systemd[1]: Finished clean-ca-certificates.service. Feb 9 01:07:38.146590 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 01:07:38.150824 systemd[1]: Finished systemd-update-utmp.service. Feb 9 01:07:38.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:38.158000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 01:07:38.158000 audit[1073]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde9de6900 a2=420 a3=0 items=0 ppid=1053 pid=1073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:38.158000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 01:07:38.159065 augenrules[1073]: No rules Feb 9 01:07:38.159486 systemd[1]: Finished audit-rules.service. Feb 9 01:07:38.163677 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 01:07:38.165513 systemd[1]: Starting systemd-update-done.service... Feb 9 01:07:38.170002 systemd[1]: Finished systemd-update-done.service. Feb 9 01:07:38.185892 systemd-resolved[1057]: Positive Trust Anchors: Feb 9 01:07:38.185904 systemd-resolved[1057]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 01:07:38.185930 systemd-resolved[1057]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 01:07:38.188451 systemd[1]: Started systemd-timesyncd.service. Feb 9 01:07:38.827876 systemd[1]: Reached target time-set.target. Feb 9 01:07:38.827928 systemd-timesyncd[1061]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 01:07:38.827960 systemd-timesyncd[1061]: Initial clock synchronization to Fri 2024-02-09 01:07:38.827861 UTC. Feb 9 01:07:38.830883 systemd-resolved[1057]: Defaulting to hostname 'linux'. Feb 9 01:07:38.832157 systemd[1]: Started systemd-resolved.service. Feb 9 01:07:38.832797 systemd[1]: Reached target network.target. Feb 9 01:07:38.833369 systemd[1]: Reached target nss-lookup.target. Feb 9 01:07:38.833957 systemd[1]: Reached target sysinit.target. Feb 9 01:07:38.834612 systemd[1]: Started motdgen.path. Feb 9 01:07:38.835140 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 01:07:38.836036 systemd[1]: Started logrotate.timer. Feb 9 01:07:38.836640 systemd[1]: Started mdadm.timer. Feb 9 01:07:38.837144 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 01:07:38.837780 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 01:07:38.837804 systemd[1]: Reached target paths.target. Feb 9 01:07:38.838405 systemd[1]: Reached target timers.target. Feb 9 01:07:38.839352 systemd[1]: Listening on dbus.socket. Feb 9 01:07:38.840664 systemd[1]: Starting docker.socket... Feb 9 01:07:38.842970 systemd[1]: Listening on sshd.socket. Feb 9 01:07:38.843632 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 01:07:38.843939 systemd[1]: Listening on docker.socket. Feb 9 01:07:38.844562 systemd[1]: Reached target sockets.target. Feb 9 01:07:38.845131 systemd[1]: Reached target basic.target. Feb 9 01:07:38.845721 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 01:07:38.845744 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 01:07:38.846518 systemd[1]: Starting containerd.service... Feb 9 01:07:38.847856 systemd[1]: Starting dbus.service... Feb 9 01:07:38.849161 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 01:07:38.850660 systemd[1]: Starting extend-filesystems.service... Feb 9 01:07:38.851395 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 01:07:38.852195 systemd[1]: Starting motdgen.service... Feb 9 01:07:38.852531 jq[1084]: false Feb 9 01:07:38.853915 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 01:07:38.855408 systemd[1]: Starting prepare-critools.service... Feb 9 01:07:38.856804 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 01:07:38.859137 systemd[1]: Starting sshd-keygen.service... Feb 9 01:07:38.861950 systemd[1]: Starting systemd-logind.service... Feb 9 01:07:38.864478 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 01:07:38.864536 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 01:07:38.865051 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 01:07:38.865831 systemd[1]: Starting update-engine.service... Feb 9 01:07:38.867352 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 01:07:38.868475 extend-filesystems[1085]: Found sr0 Feb 9 01:07:38.872566 jq[1104]: true Feb 9 01:07:38.872738 extend-filesystems[1085]: Found vda Feb 9 01:07:38.872738 extend-filesystems[1085]: Found vda1 Feb 9 01:07:38.872738 extend-filesystems[1085]: Found vda2 Feb 9 01:07:38.872738 extend-filesystems[1085]: Found vda3 Feb 9 01:07:38.872738 extend-filesystems[1085]: Found usr Feb 9 01:07:38.872738 extend-filesystems[1085]: Found vda4 Feb 9 01:07:38.872738 extend-filesystems[1085]: Found vda6 Feb 9 01:07:38.872738 extend-filesystems[1085]: Found vda7 Feb 9 01:07:38.872738 extend-filesystems[1085]: Found vda9 Feb 9 01:07:38.872738 extend-filesystems[1085]: Checking size of /dev/vda9 Feb 9 01:07:38.869659 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 01:07:38.870009 dbus-daemon[1083]: [system] SELinux support is enabled Feb 9 01:07:38.869811 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 01:07:38.898473 tar[1107]: ./ Feb 9 01:07:38.898473 tar[1107]: ./macvlan Feb 9 01:07:38.870054 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 01:07:38.898902 tar[1108]: crictl Feb 9 01:07:38.870183 systemd[1]: Finished motdgen.service. Feb 9 01:07:38.870834 systemd[1]: Started dbus.service. Feb 9 01:07:38.899279 jq[1109]: true Feb 9 01:07:38.874148 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 01:07:38.874290 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 01:07:38.876690 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 01:07:38.876712 systemd[1]: Reached target system-config.target. Feb 9 01:07:38.877452 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 01:07:38.877465 systemd[1]: Reached target user-config.target. Feb 9 01:07:38.899703 update_engine[1102]: I0209 01:07:38.899571 1102 main.cc:92] Flatcar Update Engine starting Feb 9 01:07:38.900973 extend-filesystems[1085]: Resized partition /dev/vda9 Feb 9 01:07:38.902293 update_engine[1102]: I0209 01:07:38.901309 1102 update_check_scheduler.cc:74] Next update check in 6m22s Feb 9 01:07:38.901619 systemd[1]: Started update-engine.service. Feb 9 01:07:38.903636 systemd[1]: Started locksmithd.service. Feb 9 01:07:38.907552 bash[1133]: Updated "/home/core/.ssh/authorized_keys" Feb 9 01:07:38.907636 extend-filesystems[1136]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 01:07:38.905200 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 01:07:38.917383 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 01:07:38.925906 env[1112]: time="2024-02-09T01:07:38.925852169Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 01:07:38.932599 systemd-logind[1098]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 01:07:38.932617 systemd-logind[1098]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 01:07:38.933077 systemd-logind[1098]: New seat seat0. Feb 9 01:07:38.936925 systemd[1]: Started systemd-logind.service. Feb 9 01:07:38.940392 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 01:07:38.958461 env[1112]: time="2024-02-09T01:07:38.949700104Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 01:07:38.958461 env[1112]: time="2024-02-09T01:07:38.954837236Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 01:07:38.955747 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 01:07:38.958612 extend-filesystems[1136]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 01:07:38.958612 extend-filesystems[1136]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 01:07:38.958612 extend-filesystems[1136]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 01:07:38.955899 systemd[1]: Finished extend-filesystems.service. Feb 9 01:07:38.962393 tar[1107]: ./static Feb 9 01:07:38.962423 extend-filesystems[1085]: Resized filesystem in /dev/vda9 Feb 9 01:07:38.965487 env[1112]: time="2024-02-09T01:07:38.965443262Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 01:07:38.965487 env[1112]: time="2024-02-09T01:07:38.965485581Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 01:07:38.965729 env[1112]: time="2024-02-09T01:07:38.965702839Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 01:07:38.965729 env[1112]: time="2024-02-09T01:07:38.965723247Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 01:07:38.965799 env[1112]: time="2024-02-09T01:07:38.965735851Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 01:07:38.965799 env[1112]: time="2024-02-09T01:07:38.965745479Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 01:07:38.965840 env[1112]: time="2024-02-09T01:07:38.965804940Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 01:07:38.966024 env[1112]: time="2024-02-09T01:07:38.966000697Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 01:07:38.966131 env[1112]: time="2024-02-09T01:07:38.966110313Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 01:07:38.966131 env[1112]: time="2024-02-09T01:07:38.966126864Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 01:07:38.966201 env[1112]: time="2024-02-09T01:07:38.966168672Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 01:07:38.966201 env[1112]: time="2024-02-09T01:07:38.966178781Z" level=info msg="metadata content store policy set" policy=shared Feb 9 01:07:38.971067 env[1112]: time="2024-02-09T01:07:38.971045827Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 01:07:38.971110 env[1112]: time="2024-02-09T01:07:38.971072387Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 01:07:38.971110 env[1112]: time="2024-02-09T01:07:38.971085802Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 01:07:38.971148 env[1112]: time="2024-02-09T01:07:38.971116029Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971148 env[1112]: time="2024-02-09T01:07:38.971128752Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971148 env[1112]: time="2024-02-09T01:07:38.971141436Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971229 env[1112]: time="2024-02-09T01:07:38.971152307Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971229 env[1112]: time="2024-02-09T01:07:38.971164730Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971229 env[1112]: time="2024-02-09T01:07:38.971175831Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971229 env[1112]: time="2024-02-09T01:07:38.971189406Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971229 env[1112]: time="2024-02-09T01:07:38.971201308Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971229 env[1112]: time="2024-02-09T01:07:38.971218080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 01:07:38.971335 env[1112]: time="2024-02-09T01:07:38.971292650Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 01:07:38.971389 env[1112]: time="2024-02-09T01:07:38.971351991Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 01:07:38.971596 env[1112]: time="2024-02-09T01:07:38.971576572Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 01:07:38.971636 env[1112]: time="2024-02-09T01:07:38.971601799Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971636 env[1112]: time="2024-02-09T01:07:38.971613511Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 01:07:38.971675 env[1112]: time="2024-02-09T01:07:38.971654037Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971675 env[1112]: time="2024-02-09T01:07:38.971665759Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971719 env[1112]: time="2024-02-09T01:07:38.971677251Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971719 env[1112]: time="2024-02-09T01:07:38.971688722Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971719 env[1112]: time="2024-02-09T01:07:38.971700304Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971719 env[1112]: time="2024-02-09T01:07:38.971711966Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971789 env[1112]: time="2024-02-09T01:07:38.971721734Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971789 env[1112]: time="2024-02-09T01:07:38.971733236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971789 env[1112]: time="2024-02-09T01:07:38.971745399Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 01:07:38.971852 env[1112]: time="2024-02-09T01:07:38.971835758Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971852 env[1112]: time="2024-02-09T01:07:38.971849634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971891 env[1112]: time="2024-02-09T01:07:38.971860925Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.971891 env[1112]: time="2024-02-09T01:07:38.971871485Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 01:07:38.971891 env[1112]: time="2024-02-09T01:07:38.971884139Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 01:07:38.971950 env[1112]: time="2024-02-09T01:07:38.971894057Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 01:07:38.971950 env[1112]: time="2024-02-09T01:07:38.971910669Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 01:07:38.971950 env[1112]: time="2024-02-09T01:07:38.971943200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 01:07:38.972150 env[1112]: time="2024-02-09T01:07:38.972108790Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 01:07:38.972618 env[1112]: time="2024-02-09T01:07:38.972157591Z" level=info msg="Connect containerd service" Feb 9 01:07:38.972618 env[1112]: time="2024-02-09T01:07:38.972186806Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 01:07:38.972812 env[1112]: time="2024-02-09T01:07:38.972788354Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 01:07:38.972978 env[1112]: time="2024-02-09T01:07:38.972952051Z" level=info msg="Start subscribing containerd event" Feb 9 01:07:38.973009 env[1112]: time="2024-02-09T01:07:38.972988439Z" level=info msg="Start recovering state" Feb 9 01:07:38.973044 env[1112]: time="2024-02-09T01:07:38.973031831Z" level=info msg="Start event monitor" Feb 9 01:07:38.973067 env[1112]: time="2024-02-09T01:07:38.973046869Z" level=info msg="Start snapshots syncer" Feb 9 01:07:38.973067 env[1112]: time="2024-02-09T01:07:38.973056136Z" level=info msg="Start cni network conf syncer for default" Feb 9 01:07:38.973067 env[1112]: time="2024-02-09T01:07:38.973062518Z" level=info msg="Start streaming server" Feb 9 01:07:38.973249 env[1112]: time="2024-02-09T01:07:38.973234982Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 01:07:38.973282 env[1112]: time="2024-02-09T01:07:38.973270438Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 01:07:38.973333 env[1112]: time="2024-02-09T01:07:38.973321614Z" level=info msg="containerd successfully booted in 0.056630s" Feb 9 01:07:38.973427 systemd[1]: Started containerd.service. Feb 9 01:07:38.993610 tar[1107]: ./vlan Feb 9 01:07:39.005639 locksmithd[1137]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 01:07:39.023642 tar[1107]: ./portmap Feb 9 01:07:39.051893 tar[1107]: ./host-local Feb 9 01:07:39.077356 tar[1107]: ./vrf Feb 9 01:07:39.104680 tar[1107]: ./bridge Feb 9 01:07:39.137736 tar[1107]: ./tuning Feb 9 01:07:39.163891 tar[1107]: ./firewall Feb 9 01:07:39.197884 tar[1107]: ./host-device Feb 9 01:07:39.227404 tar[1107]: ./sbr Feb 9 01:07:39.254340 tar[1107]: ./loopback Feb 9 01:07:39.272378 systemd[1]: Finished prepare-critools.service. Feb 9 01:07:39.279703 tar[1107]: ./dhcp Feb 9 01:07:39.321581 sshd_keygen[1103]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 01:07:39.338251 systemd[1]: Finished sshd-keygen.service. Feb 9 01:07:39.340279 systemd[1]: Starting issuegen.service... Feb 9 01:07:39.344999 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 01:07:39.345177 systemd[1]: Finished issuegen.service. Feb 9 01:07:39.346641 tar[1107]: ./ptp Feb 9 01:07:39.347232 systemd[1]: Starting systemd-user-sessions.service... Feb 9 01:07:39.352170 systemd[1]: Finished systemd-user-sessions.service. Feb 9 01:07:39.354168 systemd[1]: Started getty@tty1.service. Feb 9 01:07:39.355654 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 01:07:39.356456 systemd[1]: Reached target getty.target. Feb 9 01:07:39.377176 tar[1107]: ./ipvlan Feb 9 01:07:39.404131 tar[1107]: ./bandwidth Feb 9 01:07:39.437673 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 01:07:39.438653 systemd[1]: Reached target multi-user.target. Feb 9 01:07:39.440412 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 01:07:39.445881 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 01:07:39.446009 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 01:07:39.446832 systemd[1]: Startup finished in 487ms (kernel) + 4.923s (initrd) + 4.231s (userspace) = 9.643s. Feb 9 01:07:40.234522 systemd-networkd[1012]: eth0: Gained IPv6LL Feb 9 01:07:48.843026 systemd[1]: Created slice system-sshd.slice. Feb 9 01:07:48.843944 systemd[1]: Started sshd@0-10.0.0.4:22-10.0.0.1:46174.service. Feb 9 01:07:48.886910 sshd[1169]: Accepted publickey for core from 10.0.0.1 port 46174 ssh2: RSA SHA256:vqhaJY/eqcXR4cSqRL4dWjX/oVyGCNbM97WtYRYj+qU Feb 9 01:07:48.888438 sshd[1169]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 01:07:48.895479 systemd[1]: Created slice user-500.slice. Feb 9 01:07:48.896473 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 01:07:48.898059 systemd-logind[1098]: New session 1 of user core. Feb 9 01:07:48.903353 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 01:07:48.904474 systemd[1]: Starting user@500.service... Feb 9 01:07:48.906670 (systemd)[1172]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 01:07:48.970713 systemd[1172]: Queued start job for default target default.target. Feb 9 01:07:48.971169 systemd[1172]: Reached target paths.target. Feb 9 01:07:48.971191 systemd[1172]: Reached target sockets.target. Feb 9 01:07:48.971203 systemd[1172]: Reached target timers.target. Feb 9 01:07:48.971214 systemd[1172]: Reached target basic.target. Feb 9 01:07:48.971249 systemd[1172]: Reached target default.target. Feb 9 01:07:48.971272 systemd[1172]: Startup finished in 59ms. Feb 9 01:07:48.971315 systemd[1]: Started user@500.service. Feb 9 01:07:48.972145 systemd[1]: Started session-1.scope. Feb 9 01:07:49.022024 systemd[1]: Started sshd@1-10.0.0.4:22-10.0.0.1:46184.service. Feb 9 01:07:49.062070 sshd[1181]: Accepted publickey for core from 10.0.0.1 port 46184 ssh2: RSA SHA256:vqhaJY/eqcXR4cSqRL4dWjX/oVyGCNbM97WtYRYj+qU Feb 9 01:07:49.063104 sshd[1181]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 01:07:49.066410 systemd-logind[1098]: New session 2 of user core. Feb 9 01:07:49.067120 systemd[1]: Started session-2.scope. Feb 9 01:07:49.118649 sshd[1181]: pam_unix(sshd:session): session closed for user core Feb 9 01:07:49.122082 systemd[1]: Started sshd@2-10.0.0.4:22-10.0.0.1:46186.service. Feb 9 01:07:49.122487 systemd[1]: sshd@1-10.0.0.4:22-10.0.0.1:46184.service: Deactivated successfully. Feb 9 01:07:49.123024 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 01:07:49.123427 systemd-logind[1098]: Session 2 logged out. Waiting for processes to exit. Feb 9 01:07:49.124127 systemd-logind[1098]: Removed session 2. Feb 9 01:07:49.162202 sshd[1186]: Accepted publickey for core from 10.0.0.1 port 46186 ssh2: RSA SHA256:vqhaJY/eqcXR4cSqRL4dWjX/oVyGCNbM97WtYRYj+qU Feb 9 01:07:49.163223 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 01:07:49.166079 systemd-logind[1098]: New session 3 of user core. Feb 9 01:07:49.166694 systemd[1]: Started session-3.scope. Feb 9 01:07:49.214648 sshd[1186]: pam_unix(sshd:session): session closed for user core Feb 9 01:07:49.216906 systemd[1]: sshd@2-10.0.0.4:22-10.0.0.1:46186.service: Deactivated successfully. Feb 9 01:07:49.217391 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 01:07:49.217792 systemd-logind[1098]: Session 3 logged out. Waiting for processes to exit. Feb 9 01:07:49.218634 systemd[1]: Started sshd@3-10.0.0.4:22-10.0.0.1:46190.service. Feb 9 01:07:49.219222 systemd-logind[1098]: Removed session 3. Feb 9 01:07:49.258691 sshd[1193]: Accepted publickey for core from 10.0.0.1 port 46190 ssh2: RSA SHA256:vqhaJY/eqcXR4cSqRL4dWjX/oVyGCNbM97WtYRYj+qU Feb 9 01:07:49.259595 sshd[1193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 01:07:49.262276 systemd-logind[1098]: New session 4 of user core. Feb 9 01:07:49.262918 systemd[1]: Started session-4.scope. Feb 9 01:07:49.314833 sshd[1193]: pam_unix(sshd:session): session closed for user core Feb 9 01:07:49.316984 systemd[1]: sshd@3-10.0.0.4:22-10.0.0.1:46190.service: Deactivated successfully. Feb 9 01:07:49.317440 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 01:07:49.317826 systemd-logind[1098]: Session 4 logged out. Waiting for processes to exit. Feb 9 01:07:49.318596 systemd[1]: Started sshd@4-10.0.0.4:22-10.0.0.1:46202.service. Feb 9 01:07:49.319157 systemd-logind[1098]: Removed session 4. Feb 9 01:07:49.357847 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 46202 ssh2: RSA SHA256:vqhaJY/eqcXR4cSqRL4dWjX/oVyGCNbM97WtYRYj+qU Feb 9 01:07:49.358844 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 01:07:49.361397 systemd-logind[1098]: New session 5 of user core. Feb 9 01:07:49.362011 systemd[1]: Started session-5.scope. Feb 9 01:07:49.482450 sudo[1202]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 01:07:49.482614 sudo[1202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 01:07:49.492566 dbus-daemon[1083]: \xd0}\xf9T\xa7U: received setenforce notice (enforcing=593069072) Feb 9 01:07:49.494613 sudo[1202]: pam_unix(sudo:session): session closed for user root Feb 9 01:07:49.495943 sshd[1199]: pam_unix(sshd:session): session closed for user core Feb 9 01:07:49.498457 systemd[1]: sshd@4-10.0.0.4:22-10.0.0.1:46202.service: Deactivated successfully. Feb 9 01:07:49.498961 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 01:07:49.499422 systemd-logind[1098]: Session 5 logged out. Waiting for processes to exit. Feb 9 01:07:49.500266 systemd[1]: Started sshd@5-10.0.0.4:22-10.0.0.1:46208.service. Feb 9 01:07:49.500834 systemd-logind[1098]: Removed session 5. Feb 9 01:07:49.540295 sshd[1206]: Accepted publickey for core from 10.0.0.1 port 46208 ssh2: RSA SHA256:vqhaJY/eqcXR4cSqRL4dWjX/oVyGCNbM97WtYRYj+qU Feb 9 01:07:49.541529 sshd[1206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 01:07:49.544381 systemd-logind[1098]: New session 6 of user core. Feb 9 01:07:49.545113 systemd[1]: Started session-6.scope. Feb 9 01:07:49.595282 sudo[1210]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 01:07:49.595496 sudo[1210]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 01:07:49.597471 sudo[1210]: pam_unix(sudo:session): session closed for user root Feb 9 01:07:49.601238 sudo[1209]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 01:07:49.601424 sudo[1209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 01:07:49.608565 systemd[1]: Stopping audit-rules.service... Feb 9 01:07:49.608000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 01:07:49.609768 auditctl[1213]: No rules Feb 9 01:07:49.610014 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 01:07:49.610169 systemd[1]: Stopped audit-rules.service. Feb 9 01:07:49.611458 systemd[1]: Starting audit-rules.service... Feb 9 01:07:49.617313 kernel: kauditd_printk_skb: 246 callbacks suppressed Feb 9 01:07:49.617392 kernel: audit: type=1305 audit(1707440869.608:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 01:07:49.617410 kernel: audit: type=1300 audit(1707440869.608:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2778b710 a2=420 a3=0 items=0 ppid=1 pid=1213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:49.617426 kernel: audit: type=1327 audit(1707440869.608:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 01:07:49.617439 kernel: audit: type=1131 audit(1707440869.608:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.608000 audit[1213]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2778b710 a2=420 a3=0 items=0 ppid=1 pid=1213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:49.608000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 01:07:49.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.627263 augenrules[1230]: No rules Feb 9 01:07:49.627747 systemd[1]: Finished audit-rules.service. Feb 9 01:07:49.628498 sudo[1209]: pam_unix(sudo:session): session closed for user root Feb 9 01:07:49.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.629504 sshd[1206]: pam_unix(sshd:session): session closed for user core Feb 9 01:07:49.627000 audit[1209]: USER_END pid=1209 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.633388 kernel: audit: type=1130 audit(1707440869.626:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.633435 kernel: audit: type=1106 audit(1707440869.627:170): pid=1209 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.633451 kernel: audit: type=1104 audit(1707440869.627:171): pid=1209 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.627000 audit[1209]: CRED_DISP pid=1209 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.632758 systemd[1]: sshd@5-10.0.0.4:22-10.0.0.1:46208.service: Deactivated successfully. Feb 9 01:07:49.633272 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 01:07:49.633859 systemd-logind[1098]: Session 6 logged out. Waiting for processes to exit. Feb 9 01:07:49.634642 systemd[1]: Started sshd@6-10.0.0.4:22-10.0.0.1:46212.service. Feb 9 01:07:49.635429 systemd-logind[1098]: Removed session 6. Feb 9 01:07:49.635518 kernel: audit: type=1106 audit(1707440869.628:172): pid=1206 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:07:49.628000 audit[1206]: USER_END pid=1206 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:07:49.638233 kernel: audit: type=1104 audit(1707440869.628:173): pid=1206 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:07:49.628000 audit[1206]: CRED_DISP pid=1206 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:07:49.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.4:22-10.0.0.1:46208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.642760 kernel: audit: type=1131 audit(1707440869.631:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.4:22-10.0.0.1:46208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:46212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.673000 audit[1236]: USER_ACCT pid=1236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:07:49.675202 sshd[1236]: Accepted publickey for core from 10.0.0.1 port 46212 ssh2: RSA SHA256:vqhaJY/eqcXR4cSqRL4dWjX/oVyGCNbM97WtYRYj+qU Feb 9 01:07:49.674000 audit[1236]: CRED_ACQ pid=1236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:07:49.674000 audit[1236]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfcf3c7f0 a2=3 a3=0 items=0 ppid=1 pid=1236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:49.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 01:07:49.676079 sshd[1236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 01:07:49.678761 systemd-logind[1098]: New session 7 of user core. Feb 9 01:07:49.679456 systemd[1]: Started session-7.scope. Feb 9 01:07:49.681000 audit[1236]: USER_START pid=1236 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:07:49.682000 audit[1238]: CRED_ACQ pid=1238 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:07:49.727000 audit[1239]: USER_ACCT pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.728949 sudo[1239]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 01:07:49.727000 audit[1239]: CRED_REFR pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:07:49.729114 sudo[1239]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 01:07:49.728000 audit[1239]: USER_START pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:07:50.226809 systemd[1]: Reloading. Feb 9 01:07:50.279622 /usr/lib/systemd/system-generators/torcx-generator[1271]: time="2024-02-09T01:07:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 01:07:50.279866 /usr/lib/systemd/system-generators/torcx-generator[1271]: time="2024-02-09T01:07:50Z" level=info msg="torcx already run" Feb 9 01:07:50.339424 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 01:07:50.339439 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 01:07:50.355658 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.409000 audit: BPF prog-id=37 op=LOAD Feb 9 01:07:50.409000 audit: BPF prog-id=35 op=UNLOAD Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit: BPF prog-id=38 op=LOAD Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.410000 audit: BPF prog-id=39 op=LOAD Feb 9 01:07:50.410000 audit: BPF prog-id=24 op=UNLOAD Feb 9 01:07:50.410000 audit: BPF prog-id=25 op=UNLOAD Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit: BPF prog-id=40 op=LOAD Feb 9 01:07:50.411000 audit: BPF prog-id=21 op=UNLOAD Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit: BPF prog-id=41 op=LOAD Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.411000 audit: BPF prog-id=42 op=LOAD Feb 9 01:07:50.411000 audit: BPF prog-id=22 op=UNLOAD Feb 9 01:07:50.411000 audit: BPF prog-id=23 op=UNLOAD Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.412000 audit: BPF prog-id=43 op=LOAD Feb 9 01:07:50.412000 audit: BPF prog-id=30 op=UNLOAD Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit: BPF prog-id=44 op=LOAD Feb 9 01:07:50.414000 audit: BPF prog-id=32 op=UNLOAD Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit: BPF prog-id=45 op=LOAD Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit: BPF prog-id=46 op=LOAD Feb 9 01:07:50.414000 audit: BPF prog-id=33 op=UNLOAD Feb 9 01:07:50.414000 audit: BPF prog-id=34 op=UNLOAD Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.414000 audit: BPF prog-id=47 op=LOAD Feb 9 01:07:50.414000 audit: BPF prog-id=26 op=UNLOAD Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit: BPF prog-id=48 op=LOAD Feb 9 01:07:50.416000 audit: BPF prog-id=27 op=UNLOAD Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit: BPF prog-id=49 op=LOAD Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.416000 audit: BPF prog-id=50 op=LOAD Feb 9 01:07:50.416000 audit: BPF prog-id=28 op=UNLOAD Feb 9 01:07:50.416000 audit: BPF prog-id=29 op=UNLOAD Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.417000 audit: BPF prog-id=51 op=LOAD Feb 9 01:07:50.417000 audit: BPF prog-id=31 op=UNLOAD Feb 9 01:07:50.424223 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 01:07:50.429211 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 01:07:50.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:50.429679 systemd[1]: Reached target network-online.target. Feb 9 01:07:50.431122 systemd[1]: Started kubelet.service. Feb 9 01:07:50.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:50.439246 systemd[1]: Starting coreos-metadata.service... Feb 9 01:07:50.447954 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 9 01:07:50.448109 systemd[1]: Finished coreos-metadata.service. Feb 9 01:07:50.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:50.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:50.482758 kubelet[1309]: E0209 01:07:50.482646 1309 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 01:07:50.484484 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 01:07:50.484592 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 01:07:50.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 01:07:50.607812 systemd[1]: Stopped kubelet.service. Feb 9 01:07:50.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:50.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:50.621113 systemd[1]: Reloading. Feb 9 01:07:50.679029 /usr/lib/systemd/system-generators/torcx-generator[1377]: time="2024-02-09T01:07:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 01:07:50.679052 /usr/lib/systemd/system-generators/torcx-generator[1377]: time="2024-02-09T01:07:50Z" level=info msg="torcx already run" Feb 9 01:07:50.733106 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 01:07:50.733122 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 01:07:50.749240 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.801000 audit: BPF prog-id=52 op=LOAD Feb 9 01:07:50.801000 audit: BPF prog-id=37 op=UNLOAD Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit: BPF prog-id=53 op=LOAD Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.802000 audit: BPF prog-id=54 op=LOAD Feb 9 01:07:50.802000 audit: BPF prog-id=38 op=UNLOAD Feb 9 01:07:50.802000 audit: BPF prog-id=39 op=UNLOAD Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit: BPF prog-id=55 op=LOAD Feb 9 01:07:50.804000 audit: BPF prog-id=40 op=UNLOAD Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit: BPF prog-id=56 op=LOAD Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.804000 audit: BPF prog-id=57 op=LOAD Feb 9 01:07:50.804000 audit: BPF prog-id=41 op=UNLOAD Feb 9 01:07:50.804000 audit: BPF prog-id=42 op=UNLOAD Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.805000 audit: BPF prog-id=58 op=LOAD Feb 9 01:07:50.805000 audit: BPF prog-id=43 op=UNLOAD Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit: BPF prog-id=59 op=LOAD Feb 9 01:07:50.806000 audit: BPF prog-id=44 op=UNLOAD Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit: BPF prog-id=60 op=LOAD Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.806000 audit: BPF prog-id=61 op=LOAD Feb 9 01:07:50.806000 audit: BPF prog-id=45 op=UNLOAD Feb 9 01:07:50.806000 audit: BPF prog-id=46 op=UNLOAD Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.807000 audit: BPF prog-id=62 op=LOAD Feb 9 01:07:50.807000 audit: BPF prog-id=47 op=UNLOAD Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit: BPF prog-id=63 op=LOAD Feb 9 01:07:50.808000 audit: BPF prog-id=48 op=UNLOAD Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit: BPF prog-id=64 op=LOAD Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit: BPF prog-id=65 op=LOAD Feb 9 01:07:50.809000 audit: BPF prog-id=49 op=UNLOAD Feb 9 01:07:50.809000 audit: BPF prog-id=50 op=UNLOAD Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:50.809000 audit: BPF prog-id=66 op=LOAD Feb 9 01:07:50.809000 audit: BPF prog-id=51 op=UNLOAD Feb 9 01:07:50.820983 systemd[1]: Started kubelet.service. Feb 9 01:07:50.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:07:50.859732 kubelet[1418]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 01:07:50.859732 kubelet[1418]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 01:07:50.859975 kubelet[1418]: I0209 01:07:50.859760 1418 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 01:07:50.860890 kubelet[1418]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 01:07:50.860890 kubelet[1418]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 01:07:51.184049 kubelet[1418]: I0209 01:07:51.183949 1418 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 01:07:51.184049 kubelet[1418]: I0209 01:07:51.183973 1418 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 01:07:51.184203 kubelet[1418]: I0209 01:07:51.184184 1418 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 01:07:51.185850 kubelet[1418]: I0209 01:07:51.185829 1418 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 01:07:51.189450 kubelet[1418]: I0209 01:07:51.189435 1418 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 01:07:51.189620 kubelet[1418]: I0209 01:07:51.189608 1418 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 01:07:51.189677 kubelet[1418]: I0209 01:07:51.189667 1418 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 01:07:51.189755 kubelet[1418]: I0209 01:07:51.189686 1418 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 01:07:51.189755 kubelet[1418]: I0209 01:07:51.189696 1418 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 01:07:51.189860 kubelet[1418]: I0209 01:07:51.189758 1418 state_mem.go:36] "Initialized new in-memory state store" Feb 9 01:07:51.192644 kubelet[1418]: I0209 01:07:51.192618 1418 kubelet.go:398] "Attempting to sync node with API server" Feb 9 01:07:51.192644 kubelet[1418]: I0209 01:07:51.192640 1418 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 01:07:51.192816 kubelet[1418]: I0209 01:07:51.192661 1418 kubelet.go:297] "Adding apiserver pod source" Feb 9 01:07:51.192816 kubelet[1418]: I0209 01:07:51.192677 1418 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 01:07:51.192816 kubelet[1418]: E0209 01:07:51.192722 1418 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:51.192816 kubelet[1418]: E0209 01:07:51.192774 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:51.193282 kubelet[1418]: I0209 01:07:51.193264 1418 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 01:07:51.193510 kubelet[1418]: W0209 01:07:51.193491 1418 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 01:07:51.193833 kubelet[1418]: I0209 01:07:51.193807 1418 server.go:1186] "Started kubelet" Feb 9 01:07:51.193978 kubelet[1418]: I0209 01:07:51.193955 1418 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 01:07:51.194740 kubelet[1418]: E0209 01:07:51.194719 1418 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 01:07:51.194740 kubelet[1418]: E0209 01:07:51.194743 1418 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 01:07:51.195225 kubelet[1418]: I0209 01:07:51.195208 1418 server.go:451] "Adding debug handlers to kubelet server" Feb 9 01:07:51.194000 audit[1418]: AVC avc: denied { mac_admin } for pid=1418 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:51.194000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 01:07:51.194000 audit[1418]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a7a750 a1=c000ea0210 a2=c000a7a720 a3=25 items=0 ppid=1 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.194000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 01:07:51.194000 audit[1418]: AVC avc: denied { mac_admin } for pid=1418 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:51.194000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 01:07:51.194000 audit[1418]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a7e220 a1=c000ea0228 a2=c000a7a7e0 a3=25 items=0 ppid=1 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.194000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 01:07:51.195965 kubelet[1418]: I0209 01:07:51.195741 1418 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 01:07:51.195965 kubelet[1418]: I0209 01:07:51.195787 1418 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 01:07:51.195965 kubelet[1418]: I0209 01:07:51.195841 1418 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 01:07:51.196654 kubelet[1418]: I0209 01:07:51.196639 1418 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 01:07:51.196820 kubelet[1418]: I0209 01:07:51.196806 1418 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 01:07:51.203622 kubelet[1418]: E0209 01:07:51.203592 1418 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 01:07:51.203733 kubelet[1418]: W0209 01:07:51.203676 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 01:07:51.203733 kubelet[1418]: E0209 01:07:51.203694 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 01:07:51.203733 kubelet[1418]: W0209 01:07:51.203720 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 01:07:51.203733 kubelet[1418]: E0209 01:07:51.203728 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 01:07:51.203915 kubelet[1418]: E0209 01:07:51.203790 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0a7d33fc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 193785340, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 193785340, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.203998 kubelet[1418]: W0209 01:07:51.203988 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 01:07:51.204025 kubelet[1418]: E0209 01:07:51.203999 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 01:07:51.204445 kubelet[1418]: E0209 01:07:51.204378 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0a8bab4c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 194733388, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 194733388, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.214000 audit[1431]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.214000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8d3855a0 a2=0 a3=7ffe8d38558c items=0 ppid=1418 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 01:07:51.215000 audit[1436]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.215000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc00a22830 a2=0 a3=7ffc00a2281c items=0 ppid=1418 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 01:07:51.218243 kubelet[1418]: I0209 01:07:51.218228 1418 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 01:07:51.218299 kubelet[1418]: I0209 01:07:51.218260 1418 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 01:07:51.218323 kubelet[1418]: I0209 01:07:51.218312 1418 state_mem.go:36] "Initialized new in-memory state store" Feb 9 01:07:51.218587 kubelet[1418]: E0209 01:07:51.218525 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec7ac3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217855171, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217855171, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.219221 kubelet[1418]: E0209 01:07:51.219183 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec96b5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217862325, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217862325, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.219772 kubelet[1418]: E0209 01:07:51.219731 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0beca666", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217866342, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217866342, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.221235 kubelet[1418]: I0209 01:07:51.221217 1418 policy_none.go:49] "None policy: Start" Feb 9 01:07:51.221598 kubelet[1418]: I0209 01:07:51.221584 1418 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 01:07:51.221682 kubelet[1418]: I0209 01:07:51.221668 1418 state_mem.go:35] "Initializing new in-memory state store" Feb 9 01:07:51.226677 systemd[1]: Created slice kubepods.slice. Feb 9 01:07:51.229400 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 01:07:51.231692 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 01:07:51.216000 audit[1438]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.216000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd14162820 a2=0 a3=7ffd1416280c items=0 ppid=1418 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 01:07:51.232000 audit[1444]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.232000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeef6ae4a0 a2=0 a3=7ffeef6ae48c items=0 ppid=1418 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 01:07:51.238925 kubelet[1418]: I0209 01:07:51.238898 1418 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 01:07:51.237000 audit[1418]: AVC avc: denied { mac_admin } for pid=1418 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:07:51.237000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 01:07:51.237000 audit[1418]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d45830 a1=c000d789f0 a2=c000d45800 a3=25 items=0 ppid=1 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.237000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 01:07:51.239149 kubelet[1418]: I0209 01:07:51.238964 1418 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 01:07:51.239149 kubelet[1418]: I0209 01:07:51.239085 1418 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 01:07:51.239846 kubelet[1418]: E0209 01:07:51.239831 1418 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.4\" not found" Feb 9 01:07:51.241667 kubelet[1418]: E0209 01:07:51.241598 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0d4bd7c5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 240882117, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 240882117, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.261000 audit[1449]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.261000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdc344d7f0 a2=0 a3=7ffdc344d7dc items=0 ppid=1418 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 01:07:51.261000 audit[1450]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.261000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffddeadbab0 a2=0 a3=7ffddeadba9c items=0 ppid=1418 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.261000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 01:07:51.265000 audit[1453]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.265000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffebf7d9c40 a2=0 a3=7ffebf7d9c2c items=0 ppid=1418 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 01:07:51.267000 audit[1456]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.267000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd15117de0 a2=0 a3=7ffd15117dcc items=0 ppid=1418 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 01:07:51.268000 audit[1457]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.268000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff942108a0 a2=0 a3=7fff9421088c items=0 ppid=1418 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 01:07:51.268000 audit[1458]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.268000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7fac5220 a2=0 a3=7ffe7fac520c items=0 ppid=1418 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 01:07:51.270000 audit[1460]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.270000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdf4c0f430 a2=0 a3=7ffdf4c0f41c items=0 ppid=1418 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 01:07:51.271000 audit[1462]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.271000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffeb702a6b0 a2=0 a3=7ffeb702a69c items=0 ppid=1418 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 01:07:51.291000 audit[1465]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.291000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffed406ea10 a2=0 a3=7ffed406e9fc items=0 ppid=1418 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 01:07:51.293000 audit[1467]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.293000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd6af344d0 a2=0 a3=7ffd6af344bc items=0 ppid=1418 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 01:07:51.297248 kubelet[1418]: I0209 01:07:51.297218 1418 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 01:07:51.298277 kubelet[1418]: E0209 01:07:51.298250 1418 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 01:07:51.298277 kubelet[1418]: E0209 01:07:51.298230 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec7ac3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217855171, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 297171950, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec7ac3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.298957 kubelet[1418]: E0209 01:07:51.298916 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec96b5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217862325, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 297181258, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec96b5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.299548 kubelet[1418]: E0209 01:07:51.299503 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0beca666", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217866342, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 297184243, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0beca666" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.298000 audit[1470]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.298000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffe42e51b60 a2=0 a3=7ffe42e51b4c items=0 ppid=1418 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 01:07:51.300492 kubelet[1418]: I0209 01:07:51.300468 1418 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 01:07:51.299000 audit[1471]: NETFILTER_CFG table=mangle:17 family=10 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.299000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec3588b80 a2=0 a3=7ffec3588b6c items=0 ppid=1418 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 01:07:51.299000 audit[1472]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.299000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9892cc10 a2=0 a3=7fff9892cbfc items=0 ppid=1418 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 01:07:51.300000 audit[1473]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.300000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff18d66280 a2=0 a3=7fff18d6626c items=0 ppid=1418 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 01:07:51.300000 audit[1474]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.300000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc6420180 a2=0 a3=7fffc642016c items=0 ppid=1418 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 01:07:51.301000 audit[1476]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:07:51.301000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5afefc80 a2=0 a3=7ffd5afefc6c items=0 ppid=1418 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 01:07:51.302000 audit[1477]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.302000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffccbda1da0 a2=0 a3=7ffccbda1d8c items=0 ppid=1418 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 01:07:51.302000 audit[1478]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.302000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe75e0c070 a2=0 a3=7ffe75e0c05c items=0 ppid=1418 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 01:07:51.304000 audit[1480]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.304000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffeb68a5f00 a2=0 a3=7ffeb68a5eec items=0 ppid=1418 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 01:07:51.305000 audit[1481]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.305000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe0725ecd0 a2=0 a3=7ffe0725ecbc items=0 ppid=1418 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 01:07:51.306000 audit[1482]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.306000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff86208300 a2=0 a3=7fff862082ec items=0 ppid=1418 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 01:07:51.307000 audit[1484]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.307000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff2ca86780 a2=0 a3=7fff2ca8676c items=0 ppid=1418 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 01:07:51.309000 audit[1486]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.309000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd294edb60 a2=0 a3=7ffd294edb4c items=0 ppid=1418 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 01:07:51.310000 audit[1488]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.310000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffee188f050 a2=0 a3=7ffee188f03c items=0 ppid=1418 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 01:07:51.312000 audit[1490]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.312000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd709f84f0 a2=0 a3=7ffd709f84dc items=0 ppid=1418 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 01:07:51.314000 audit[1492]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.314000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffec22bda80 a2=0 a3=7ffec22bda6c items=0 ppid=1418 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 01:07:51.316107 kubelet[1418]: I0209 01:07:51.316095 1418 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 01:07:51.316139 kubelet[1418]: I0209 01:07:51.316109 1418 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 01:07:51.316139 kubelet[1418]: I0209 01:07:51.316126 1418 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 01:07:51.316181 kubelet[1418]: E0209 01:07:51.316171 1418 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 01:07:51.315000 audit[1493]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.315000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6a640a50 a2=0 a3=7ffc6a640a3c items=0 ppid=1418 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 01:07:51.317048 kubelet[1418]: W0209 01:07:51.316967 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 01:07:51.317048 kubelet[1418]: E0209 01:07:51.316986 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 01:07:51.316000 audit[1494]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.316000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff08796480 a2=0 a3=7fff0879646c items=0 ppid=1418 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 01:07:51.317000 audit[1495]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:07:51.317000 audit[1495]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd9bd72c0 a2=0 a3=7fffd9bd72ac items=0 ppid=1418 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:07:51.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 01:07:51.404581 kubelet[1418]: E0209 01:07:51.404560 1418 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 01:07:51.500415 kubelet[1418]: I0209 01:07:51.499436 1418 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 01:07:51.500415 kubelet[1418]: E0209 01:07:51.500173 1418 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 01:07:51.500415 kubelet[1418]: E0209 01:07:51.500351 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec7ac3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217855171, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 499401791, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec7ac3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.501223 kubelet[1418]: E0209 01:07:51.501158 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec96b5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217862325, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 499412130, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec96b5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.595536 kubelet[1418]: E0209 01:07:51.595485 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0beca666", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217866342, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 499415306, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0beca666" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.805561 kubelet[1418]: E0209 01:07:51.805491 1418 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 01:07:51.901272 kubelet[1418]: I0209 01:07:51.901244 1418 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 01:07:51.902120 kubelet[1418]: E0209 01:07:51.902077 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec7ac3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217855171, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 901213999, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec7ac3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:51.902245 kubelet[1418]: E0209 01:07:51.902227 1418 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 01:07:51.995399 kubelet[1418]: E0209 01:07:51.995310 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec96b5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217862325, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 901222515, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec96b5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:52.011650 kubelet[1418]: W0209 01:07:52.011624 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 01:07:52.011686 kubelet[1418]: E0209 01:07:52.011653 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 01:07:52.192408 kubelet[1418]: W0209 01:07:52.192302 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 01:07:52.192408 kubelet[1418]: E0209 01:07:52.192325 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 01:07:52.193406 kubelet[1418]: E0209 01:07:52.193378 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:52.195113 kubelet[1418]: E0209 01:07:52.195067 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0beca666", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217866342, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 901225651, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0beca666" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:52.295940 kubelet[1418]: W0209 01:07:52.295917 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 01:07:52.295940 kubelet[1418]: E0209 01:07:52.295935 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 01:07:52.404405 kubelet[1418]: W0209 01:07:52.404381 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 01:07:52.404405 kubelet[1418]: E0209 01:07:52.404398 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 01:07:52.607139 kubelet[1418]: E0209 01:07:52.607062 1418 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 01:07:52.702887 kubelet[1418]: I0209 01:07:52.702863 1418 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 01:07:52.703715 kubelet[1418]: E0209 01:07:52.703694 1418 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 01:07:52.703969 kubelet[1418]: E0209 01:07:52.703902 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec7ac3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217855171, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 52, 702836170, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec7ac3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:52.704810 kubelet[1418]: E0209 01:07:52.704762 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec96b5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217862325, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 52, 702844085, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec96b5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:52.794948 kubelet[1418]: E0209 01:07:52.794886 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0beca666", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217866342, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 52, 702846470, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0beca666" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:53.193673 kubelet[1418]: E0209 01:07:53.193641 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:54.194705 kubelet[1418]: E0209 01:07:54.194676 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:54.208630 kubelet[1418]: E0209 01:07:54.208589 1418 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 01:07:54.304533 kubelet[1418]: I0209 01:07:54.304516 1418 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 01:07:54.305359 kubelet[1418]: E0209 01:07:54.305318 1418 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 01:07:54.305534 kubelet[1418]: E0209 01:07:54.305445 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec7ac3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217855171, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 54, 304483719, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec7ac3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:54.306271 kubelet[1418]: E0209 01:07:54.306223 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec96b5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217862325, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 54, 304494078, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec96b5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:54.306865 kubelet[1418]: E0209 01:07:54.306814 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0beca666", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217866342, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 54, 304496303, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0beca666" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:54.540670 kubelet[1418]: W0209 01:07:54.540536 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 01:07:54.540670 kubelet[1418]: E0209 01:07:54.540562 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 01:07:54.702224 kubelet[1418]: W0209 01:07:54.702197 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 01:07:54.702224 kubelet[1418]: E0209 01:07:54.702219 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 01:07:54.886815 kubelet[1418]: W0209 01:07:54.886700 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 01:07:54.886815 kubelet[1418]: E0209 01:07:54.886730 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 01:07:55.194985 kubelet[1418]: E0209 01:07:55.194909 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:55.207690 kubelet[1418]: W0209 01:07:55.207664 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 01:07:55.207690 kubelet[1418]: E0209 01:07:55.207687 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 01:07:56.195556 kubelet[1418]: E0209 01:07:56.195507 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:57.195991 kubelet[1418]: E0209 01:07:57.195932 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:57.409533 kubelet[1418]: E0209 01:07:57.409498 1418 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.0.0.4" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 01:07:57.506378 kubelet[1418]: I0209 01:07:57.506290 1418 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 01:07:57.507254 kubelet[1418]: E0209 01:07:57.507228 1418 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.4" Feb 9 01:07:57.507427 kubelet[1418]: E0209 01:07:57.507337 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec7ac3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.4 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217855171, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 57, 506253567, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec7ac3" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:57.508064 kubelet[1418]: E0209 01:07:57.507999 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0bec96b5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.4 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217862325, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 57, 506265519, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0bec96b5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:57.508705 kubelet[1418]: E0209 01:07:57.508662 1418 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4.17b20c6d0beca666", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.4", UID:"10.0.0.4", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.4 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.4"}, FirstTimestamp:time.Date(2024, time.February, 9, 1, 7, 51, 217866342, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 1, 7, 57, 506268084, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.4.17b20c6d0beca666" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 01:07:58.196251 kubelet[1418]: E0209 01:07:58.196215 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:58.948829 kubelet[1418]: W0209 01:07:58.948788 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 01:07:58.948829 kubelet[1418]: E0209 01:07:58.948816 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 01:07:59.196732 kubelet[1418]: E0209 01:07:59.196697 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:07:59.882519 kubelet[1418]: W0209 01:07:59.882484 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 01:07:59.882519 kubelet[1418]: E0209 01:07:59.882515 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.4" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 01:08:00.197876 kubelet[1418]: E0209 01:08:00.197785 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:00.604083 kubelet[1418]: W0209 01:08:00.604024 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 01:08:00.604083 kubelet[1418]: E0209 01:08:00.604052 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 01:08:00.872175 kubelet[1418]: W0209 01:08:00.872114 1418 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 01:08:00.872175 kubelet[1418]: E0209 01:08:00.872145 1418 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 01:08:01.186243 kubelet[1418]: I0209 01:08:01.186210 1418 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 01:08:01.198446 kubelet[1418]: E0209 01:08:01.198406 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:01.240427 kubelet[1418]: E0209 01:08:01.240408 1418 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.4\" not found" Feb 9 01:08:01.542109 kubelet[1418]: E0209 01:08:01.542019 1418 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.4" not found Feb 9 01:08:02.198793 kubelet[1418]: E0209 01:08:02.198769 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:02.607014 kubelet[1418]: E0209 01:08:02.606932 1418 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.4" not found Feb 9 01:08:03.199846 kubelet[1418]: E0209 01:08:03.199802 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:03.812476 kubelet[1418]: E0209 01:08:03.812440 1418 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.4\" not found" node="10.0.0.4" Feb 9 01:08:03.908588 kubelet[1418]: I0209 01:08:03.908550 1418 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.4" Feb 9 01:08:04.007287 kubelet[1418]: I0209 01:08:04.007243 1418 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.4" Feb 9 01:08:04.014175 kubelet[1418]: E0209 01:08:04.014145 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.114738 kubelet[1418]: E0209 01:08:04.114640 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.200281 kubelet[1418]: E0209 01:08:04.200233 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:04.215106 kubelet[1418]: E0209 01:08:04.215091 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.315691 kubelet[1418]: E0209 01:08:04.315657 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.333023 sudo[1239]: pam_unix(sudo:session): session closed for user root Feb 9 01:08:04.331000 audit[1239]: USER_END pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:08:04.333697 kernel: kauditd_printk_skb: 474 callbacks suppressed Feb 9 01:08:04.333819 kernel: audit: type=1106 audit(1707440884.331:572): pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:08:04.334074 sshd[1236]: pam_unix(sshd:session): session closed for user core Feb 9 01:08:04.331000 audit[1239]: CRED_DISP pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:08:04.336028 systemd[1]: sshd@6-10.0.0.4:22-10.0.0.1:46212.service: Deactivated successfully. Feb 9 01:08:04.336640 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 01:08:04.337156 systemd-logind[1098]: Session 7 logged out. Waiting for processes to exit. Feb 9 01:08:04.337847 systemd-logind[1098]: Removed session 7. Feb 9 01:08:04.338409 kernel: audit: type=1104 audit(1707440884.331:573): pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 01:08:04.338437 kernel: audit: type=1106 audit(1707440884.333:574): pid=1236 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:08:04.333000 audit[1236]: USER_END pid=1236 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:08:04.341226 kernel: audit: type=1104 audit(1707440884.333:575): pid=1236 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:08:04.333000 audit[1236]: CRED_DISP pid=1236 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 01:08:04.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:46212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:08:04.345681 kernel: audit: type=1131 audit(1707440884.334:576): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:46212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 01:08:04.416587 kubelet[1418]: E0209 01:08:04.416552 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.516671 kubelet[1418]: E0209 01:08:04.516623 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.617129 kubelet[1418]: E0209 01:08:04.617084 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.717774 kubelet[1418]: E0209 01:08:04.717680 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.818148 kubelet[1418]: E0209 01:08:04.818109 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:04.918690 kubelet[1418]: E0209 01:08:04.918662 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.019222 kubelet[1418]: E0209 01:08:05.019119 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.119607 kubelet[1418]: E0209 01:08:05.119584 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.201259 kubelet[1418]: E0209 01:08:05.201231 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:05.220348 kubelet[1418]: E0209 01:08:05.220327 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.321100 kubelet[1418]: E0209 01:08:05.321051 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.421328 kubelet[1418]: E0209 01:08:05.421309 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.522326 kubelet[1418]: E0209 01:08:05.522303 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.622795 kubelet[1418]: E0209 01:08:05.622741 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.723328 kubelet[1418]: E0209 01:08:05.723295 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.823774 kubelet[1418]: E0209 01:08:05.823747 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:05.924303 kubelet[1418]: E0209 01:08:05.924267 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:06.024781 kubelet[1418]: E0209 01:08:06.024730 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:06.125236 kubelet[1418]: E0209 01:08:06.125175 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:06.202100 kubelet[1418]: E0209 01:08:06.201962 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:06.226094 kubelet[1418]: E0209 01:08:06.226049 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:06.326512 kubelet[1418]: E0209 01:08:06.326481 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:06.427581 kubelet[1418]: E0209 01:08:06.427552 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:06.528100 kubelet[1418]: E0209 01:08:06.528022 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:06.628492 kubelet[1418]: E0209 01:08:06.628462 1418 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.4\" not found" Feb 9 01:08:06.729884 kubelet[1418]: I0209 01:08:06.729870 1418 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 01:08:06.730218 env[1112]: time="2024-02-09T01:08:06.730176209Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 01:08:06.730474 kubelet[1418]: I0209 01:08:06.730321 1418 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 01:08:07.202826 kubelet[1418]: I0209 01:08:07.202790 1418 apiserver.go:52] "Watching apiserver" Feb 9 01:08:07.202826 kubelet[1418]: E0209 01:08:07.202824 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:07.204742 kubelet[1418]: I0209 01:08:07.204714 1418 topology_manager.go:210] "Topology Admit Handler" Feb 9 01:08:07.204839 kubelet[1418]: I0209 01:08:07.204806 1418 topology_manager.go:210] "Topology Admit Handler" Feb 9 01:08:07.204839 kubelet[1418]: I0209 01:08:07.204837 1418 topology_manager.go:210] "Topology Admit Handler" Feb 9 01:08:07.205029 kubelet[1418]: E0209 01:08:07.204988 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:07.209677 systemd[1]: Created slice kubepods-besteffort-podd6dcb348_b94a_4ba0_a06f_76e4220d62f0.slice. Feb 9 01:08:07.218910 systemd[1]: Created slice kubepods-besteffort-podb37281cd_2819_42cc_8dfd_2d068ad756b5.slice. Feb 9 01:08:07.298206 kubelet[1418]: I0209 01:08:07.298182 1418 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 01:08:07.369135 kubelet[1418]: I0209 01:08:07.369108 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-policysync\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369185 kubelet[1418]: I0209 01:08:07.369144 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b37281cd-2819-42cc-8dfd-2d068ad756b5-tigera-ca-bundle\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369297 kubelet[1418]: I0209 01:08:07.369257 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-var-lib-calico\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369385 kubelet[1418]: I0209 01:08:07.369326 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vtpnc\" (UniqueName: \"kubernetes.io/projected/b37281cd-2819-42cc-8dfd-2d068ad756b5-kube-api-access-vtpnc\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369385 kubelet[1418]: I0209 01:08:07.369358 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d6dcb348-b94a-4ba0-a06f-76e4220d62f0-kube-proxy\") pod \"kube-proxy-5p8jc\" (UID: \"d6dcb348-b94a-4ba0-a06f-76e4220d62f0\") " pod="kube-system/kube-proxy-5p8jc" Feb 9 01:08:07.369446 kubelet[1418]: I0209 01:08:07.369389 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d6dcb348-b94a-4ba0-a06f-76e4220d62f0-xtables-lock\") pod \"kube-proxy-5p8jc\" (UID: \"d6dcb348-b94a-4ba0-a06f-76e4220d62f0\") " pod="kube-system/kube-proxy-5p8jc" Feb 9 01:08:07.369446 kubelet[1418]: I0209 01:08:07.369412 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5d1dd464-a956-48ec-83e2-549250dfbace-socket-dir\") pod \"csi-node-driver-5rhlm\" (UID: \"5d1dd464-a956-48ec-83e2-549250dfbace\") " pod="calico-system/csi-node-driver-5rhlm" Feb 9 01:08:07.369492 kubelet[1418]: I0209 01:08:07.369467 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5d1dd464-a956-48ec-83e2-549250dfbace-registration-dir\") pod \"csi-node-driver-5rhlm\" (UID: \"5d1dd464-a956-48ec-83e2-549250dfbace\") " pod="calico-system/csi-node-driver-5rhlm" Feb 9 01:08:07.369518 kubelet[1418]: I0209 01:08:07.369498 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-xtables-lock\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369544 kubelet[1418]: I0209 01:08:07.369521 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b37281cd-2819-42cc-8dfd-2d068ad756b5-node-certs\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369568 kubelet[1418]: I0209 01:08:07.369560 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-cni-bin-dir\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369593 kubelet[1418]: I0209 01:08:07.369583 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d6dcb348-b94a-4ba0-a06f-76e4220d62f0-lib-modules\") pod \"kube-proxy-5p8jc\" (UID: \"d6dcb348-b94a-4ba0-a06f-76e4220d62f0\") " pod="kube-system/kube-proxy-5p8jc" Feb 9 01:08:07.369616 kubelet[1418]: I0209 01:08:07.369609 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wkw5g\" (UniqueName: \"kubernetes.io/projected/d6dcb348-b94a-4ba0-a06f-76e4220d62f0-kube-api-access-wkw5g\") pod \"kube-proxy-5p8jc\" (UID: \"d6dcb348-b94a-4ba0-a06f-76e4220d62f0\") " pod="kube-system/kube-proxy-5p8jc" Feb 9 01:08:07.369675 kubelet[1418]: I0209 01:08:07.369653 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5d1dd464-a956-48ec-83e2-549250dfbace-kubelet-dir\") pod \"csi-node-driver-5rhlm\" (UID: \"5d1dd464-a956-48ec-83e2-549250dfbace\") " pod="calico-system/csi-node-driver-5rhlm" Feb 9 01:08:07.369711 kubelet[1418]: I0209 01:08:07.369699 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4ksr4\" (UniqueName: \"kubernetes.io/projected/5d1dd464-a956-48ec-83e2-549250dfbace-kube-api-access-4ksr4\") pod \"csi-node-driver-5rhlm\" (UID: \"5d1dd464-a956-48ec-83e2-549250dfbace\") " pod="calico-system/csi-node-driver-5rhlm" Feb 9 01:08:07.369768 kubelet[1418]: I0209 01:08:07.369745 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-lib-modules\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369803 kubelet[1418]: I0209 01:08:07.369792 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-var-run-calico\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369845 kubelet[1418]: I0209 01:08:07.369832 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-cni-net-dir\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369874 kubelet[1418]: I0209 01:08:07.369866 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-cni-log-dir\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369919 kubelet[1418]: I0209 01:08:07.369905 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b37281cd-2819-42cc-8dfd-2d068ad756b5-flexvol-driver-host\") pod \"calico-node-xsks4\" (UID: \"b37281cd-2819-42cc-8dfd-2d068ad756b5\") " pod="calico-system/calico-node-xsks4" Feb 9 01:08:07.369962 kubelet[1418]: I0209 01:08:07.369951 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5d1dd464-a956-48ec-83e2-549250dfbace-varrun\") pod \"csi-node-driver-5rhlm\" (UID: \"5d1dd464-a956-48ec-83e2-549250dfbace\") " pod="calico-system/csi-node-driver-5rhlm" Feb 9 01:08:07.369995 kubelet[1418]: I0209 01:08:07.369984 1418 reconciler.go:41] "Reconciler: start to sync state" Feb 9 01:08:07.474627 kubelet[1418]: E0209 01:08:07.473904 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.474627 kubelet[1418]: W0209 01:08:07.473927 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.474627 kubelet[1418]: E0209 01:08:07.473950 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.571594 kubelet[1418]: E0209 01:08:07.571566 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.571594 kubelet[1418]: W0209 01:08:07.571582 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.571594 kubelet[1418]: E0209 01:08:07.571601 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.571792 kubelet[1418]: E0209 01:08:07.571740 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.571792 kubelet[1418]: W0209 01:08:07.571747 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.571792 kubelet[1418]: E0209 01:08:07.571755 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.571904 kubelet[1418]: E0209 01:08:07.571885 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.571904 kubelet[1418]: W0209 01:08:07.571894 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.571904 kubelet[1418]: E0209 01:08:07.571903 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.672702 kubelet[1418]: E0209 01:08:07.672670 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.672702 kubelet[1418]: W0209 01:08:07.672686 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.672702 kubelet[1418]: E0209 01:08:07.672706 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.672877 kubelet[1418]: E0209 01:08:07.672847 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.672877 kubelet[1418]: W0209 01:08:07.672854 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.672877 kubelet[1418]: E0209 01:08:07.672863 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.673019 kubelet[1418]: E0209 01:08:07.673000 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.673019 kubelet[1418]: W0209 01:08:07.673009 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.673019 kubelet[1418]: E0209 01:08:07.673019 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.774437 kubelet[1418]: E0209 01:08:07.774346 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.774437 kubelet[1418]: W0209 01:08:07.774360 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.774437 kubelet[1418]: E0209 01:08:07.774390 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.774559 kubelet[1418]: E0209 01:08:07.774550 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.774559 kubelet[1418]: W0209 01:08:07.774556 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.774623 kubelet[1418]: E0209 01:08:07.774565 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.774738 kubelet[1418]: E0209 01:08:07.774687 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.774738 kubelet[1418]: W0209 01:08:07.774697 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.774738 kubelet[1418]: E0209 01:08:07.774706 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.810617 kubelet[1418]: E0209 01:08:07.810600 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.810617 kubelet[1418]: W0209 01:08:07.810613 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.810711 kubelet[1418]: E0209 01:08:07.810628 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.817713 kubelet[1418]: E0209 01:08:07.817690 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:07.818286 env[1112]: time="2024-02-09T01:08:07.818246320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5p8jc,Uid:d6dcb348-b94a-4ba0-a06f-76e4220d62f0,Namespace:kube-system,Attempt:0,}" Feb 9 01:08:07.875103 kubelet[1418]: E0209 01:08:07.875083 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.875103 kubelet[1418]: W0209 01:08:07.875096 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.875200 kubelet[1418]: E0209 01:08:07.875111 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.875314 kubelet[1418]: E0209 01:08:07.875295 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.875314 kubelet[1418]: W0209 01:08:07.875304 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.875314 kubelet[1418]: E0209 01:08:07.875315 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.976723 kubelet[1418]: E0209 01:08:07.976696 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.976723 kubelet[1418]: W0209 01:08:07.976712 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.976816 kubelet[1418]: E0209 01:08:07.976731 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:07.976897 kubelet[1418]: E0209 01:08:07.976880 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:07.976897 kubelet[1418]: W0209 01:08:07.976892 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:07.976970 kubelet[1418]: E0209 01:08:07.976900 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:08.010794 kubelet[1418]: E0209 01:08:08.010768 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:08.010794 kubelet[1418]: W0209 01:08:08.010782 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:08.010794 kubelet[1418]: E0209 01:08:08.010797 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:08.077770 kubelet[1418]: E0209 01:08:08.077696 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:08.077770 kubelet[1418]: W0209 01:08:08.077712 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:08.077770 kubelet[1418]: E0209 01:08:08.077729 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:08.120957 kubelet[1418]: E0209 01:08:08.120929 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:08.121310 env[1112]: time="2024-02-09T01:08:08.121270450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xsks4,Uid:b37281cd-2819-42cc-8dfd-2d068ad756b5,Namespace:calico-system,Attempt:0,}" Feb 9 01:08:08.178530 kubelet[1418]: E0209 01:08:08.178500 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:08.178530 kubelet[1418]: W0209 01:08:08.178523 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:08.178604 kubelet[1418]: E0209 01:08:08.178543 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:08.203650 kubelet[1418]: E0209 01:08:08.203627 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:08.211892 kubelet[1418]: E0209 01:08:08.211861 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:08.211892 kubelet[1418]: W0209 01:08:08.211884 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:08.211892 kubelet[1418]: E0209 01:08:08.211900 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:08.512563 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1385571143.mount: Deactivated successfully. Feb 9 01:08:08.517878 env[1112]: time="2024-02-09T01:08:08.517839407Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:08.520494 env[1112]: time="2024-02-09T01:08:08.520453318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:08.521289 env[1112]: time="2024-02-09T01:08:08.521243169Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:08.523233 env[1112]: time="2024-02-09T01:08:08.523205368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:08.524233 env[1112]: time="2024-02-09T01:08:08.524197639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:08.525474 env[1112]: time="2024-02-09T01:08:08.525448574Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:08.526726 env[1112]: time="2024-02-09T01:08:08.526700121Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:08.528939 env[1112]: time="2024-02-09T01:08:08.528914934Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:08.544745 env[1112]: time="2024-02-09T01:08:08.544685994Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 01:08:08.544745 env[1112]: time="2024-02-09T01:08:08.544720179Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 01:08:08.544745 env[1112]: time="2024-02-09T01:08:08.544730017Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 01:08:08.544877 env[1112]: time="2024-02-09T01:08:08.544796742Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 01:08:08.544877 env[1112]: time="2024-02-09T01:08:08.544828993Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287 pid=1537 runtime=io.containerd.runc.v2 Feb 9 01:08:08.544877 env[1112]: time="2024-02-09T01:08:08.544830566Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 01:08:08.544877 env[1112]: time="2024-02-09T01:08:08.544844011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 01:08:08.544978 env[1112]: time="2024-02-09T01:08:08.544936975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2eaf104744fdbfebbb592629628060f84fc50e439b0e34f64a87f6171ae99018 pid=1536 runtime=io.containerd.runc.v2 Feb 9 01:08:08.554648 systemd[1]: Started cri-containerd-2eaf104744fdbfebbb592629628060f84fc50e439b0e34f64a87f6171ae99018.scope. Feb 9 01:08:08.560851 systemd[1]: Started cri-containerd-a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287.scope. Feb 9 01:08:08.568391 kernel: audit: type=1400 audit(1707440888.562:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.568517 kernel: audit: type=1400 audit(1707440888.562:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.568538 kernel: audit: type=1400 audit(1707440888.562:579): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.572000 kernel: audit: type=1400 audit(1707440888.562:580): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.572052 kernel: audit: type=1400 audit(1707440888.562:581): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit: BPF prog-id=67 op=LOAD Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616631303437343466646266656262623539323632393632383036 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616631303437343466646266656262623539323632393632383036 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit: BPF prog-id=68 op=LOAD Feb 9 01:08:08.567000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.567000 audit: BPF prog-id=69 op=LOAD Feb 9 01:08:08.567000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001adb60 items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616631303437343466646266656262623539323632393632383036 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit: BPF prog-id=70 op=LOAD Feb 9 01:08:08.573000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001adba8 items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616631303437343466646266656262623539323632393632383036 Feb 9 01:08:08.573000 audit: BPF prog-id=70 op=UNLOAD Feb 9 01:08:08.573000 audit: BPF prog-id=69 op=UNLOAD Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit: BPF prog-id=71 op=LOAD Feb 9 01:08:08.573000 audit[1555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001adfb8 items=0 ppid=1536 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616631303437343466646266656262623539323632393632383036 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1537 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363162653539353835663337663639663033646536363062643466 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=1537 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363162653539353835663337663639663033646536363062643466 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit: BPF prog-id=72 op=LOAD Feb 9 01:08:08.573000 audit[1560]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000308cf0 items=0 ppid=1537 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363162653539353835663337663639663033646536363062643466 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit: BPF prog-id=73 op=LOAD Feb 9 01:08:08.573000 audit[1560]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000308d38 items=0 ppid=1537 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363162653539353835663337663639663033646536363062643466 Feb 9 01:08:08.573000 audit: BPF prog-id=73 op=UNLOAD Feb 9 01:08:08.573000 audit: BPF prog-id=72 op=UNLOAD Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { perfmon } for pid=1560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit[1560]: AVC avc: denied { bpf } for pid=1560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:08.573000 audit: BPF prog-id=74 op=LOAD Feb 9 01:08:08.573000 audit[1560]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000309148 items=0 ppid=1537 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:08.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363162653539353835663337663639663033646536363062643466 Feb 9 01:08:08.585257 env[1112]: time="2024-02-09T01:08:08.585208574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xsks4,Uid:b37281cd-2819-42cc-8dfd-2d068ad756b5,Namespace:calico-system,Attempt:0,} returns sandbox id \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\"" Feb 9 01:08:08.585435 env[1112]: time="2024-02-09T01:08:08.585408259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5p8jc,Uid:d6dcb348-b94a-4ba0-a06f-76e4220d62f0,Namespace:kube-system,Attempt:0,} returns sandbox id \"2eaf104744fdbfebbb592629628060f84fc50e439b0e34f64a87f6171ae99018\"" Feb 9 01:08:08.586162 kubelet[1418]: E0209 01:08:08.585946 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:08.586162 kubelet[1418]: E0209 01:08:08.586024 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:08.586890 env[1112]: time="2024-02-09T01:08:08.586860762Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 01:08:09.204138 kubelet[1418]: E0209 01:08:09.204090 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:09.316901 kubelet[1418]: E0209 01:08:09.316847 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:09.595775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1945668737.mount: Deactivated successfully. Feb 9 01:08:10.033475 env[1112]: time="2024-02-09T01:08:10.033429729Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:10.035121 env[1112]: time="2024-02-09T01:08:10.035070735Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:10.036592 env[1112]: time="2024-02-09T01:08:10.036562092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:10.037741 env[1112]: time="2024-02-09T01:08:10.037696379Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:10.038110 env[1112]: time="2024-02-09T01:08:10.038070440Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 01:08:10.038701 kubelet[1418]: E0209 01:08:10.038642 1418 kuberuntime_manager.go:872] container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.26.13,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wkw5g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod kube-proxy-5p8jc_kube-system(d6dcb348-b94a-4ba0-a06f-76e4220d62f0): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Feb 9 01:08:10.038832 kubelet[1418]: E0209 01:08:10.038718 1418 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="kube-system/kube-proxy-5p8jc" podUID=d6dcb348-b94a-4ba0-a06f-76e4220d62f0 Feb 9 01:08:10.038920 env[1112]: time="2024-02-09T01:08:10.038734184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 01:08:10.204238 kubelet[1418]: E0209 01:08:10.204201 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:10.342220 kubelet[1418]: E0209 01:08:10.342106 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:10.342920 kubelet[1418]: E0209 01:08:10.342895 1418 kuberuntime_manager.go:872] container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.26.13,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wkw5g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod kube-proxy-5p8jc_kube-system(d6dcb348-b94a-4ba0-a06f-76e4220d62f0): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Feb 9 01:08:10.343036 kubelet[1418]: E0209 01:08:10.342933 1418 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="kube-system/kube-proxy-5p8jc" podUID=d6dcb348-b94a-4ba0-a06f-76e4220d62f0 Feb 9 01:08:10.414772 kubelet[1418]: E0209 01:08:10.414738 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.414772 kubelet[1418]: W0209 01:08:10.414757 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.414772 kubelet[1418]: E0209 01:08:10.414778 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.414960 kubelet[1418]: E0209 01:08:10.414936 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.414960 kubelet[1418]: W0209 01:08:10.414942 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.414960 kubelet[1418]: E0209 01:08:10.414950 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.415102 kubelet[1418]: E0209 01:08:10.415083 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.415102 kubelet[1418]: W0209 01:08:10.415092 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.415102 kubelet[1418]: E0209 01:08:10.415101 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.415286 kubelet[1418]: E0209 01:08:10.415273 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.415286 kubelet[1418]: W0209 01:08:10.415281 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.415286 kubelet[1418]: E0209 01:08:10.415289 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.415447 kubelet[1418]: E0209 01:08:10.415435 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.415447 kubelet[1418]: W0209 01:08:10.415443 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.415495 kubelet[1418]: E0209 01:08:10.415451 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.415585 kubelet[1418]: E0209 01:08:10.415571 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.415585 kubelet[1418]: W0209 01:08:10.415579 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.415585 kubelet[1418]: E0209 01:08:10.415587 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.415731 kubelet[1418]: E0209 01:08:10.415718 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.415731 kubelet[1418]: W0209 01:08:10.415725 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.415731 kubelet[1418]: E0209 01:08:10.415734 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.415864 kubelet[1418]: E0209 01:08:10.415851 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.415864 kubelet[1418]: W0209 01:08:10.415859 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.415864 kubelet[1418]: E0209 01:08:10.415867 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.415997 kubelet[1418]: E0209 01:08:10.415984 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.415997 kubelet[1418]: W0209 01:08:10.415991 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.415997 kubelet[1418]: E0209 01:08:10.416000 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.416175 kubelet[1418]: E0209 01:08:10.416156 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.416175 kubelet[1418]: W0209 01:08:10.416166 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.416175 kubelet[1418]: E0209 01:08:10.416173 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.416302 kubelet[1418]: E0209 01:08:10.416292 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.416302 kubelet[1418]: W0209 01:08:10.416301 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.416355 kubelet[1418]: E0209 01:08:10.416309 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.416464 kubelet[1418]: E0209 01:08:10.416454 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.416464 kubelet[1418]: W0209 01:08:10.416462 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.416515 kubelet[1418]: E0209 01:08:10.416470 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.416609 kubelet[1418]: E0209 01:08:10.416595 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.416609 kubelet[1418]: W0209 01:08:10.416603 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.416609 kubelet[1418]: E0209 01:08:10.416610 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.416741 kubelet[1418]: E0209 01:08:10.416730 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.416741 kubelet[1418]: W0209 01:08:10.416737 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.416818 kubelet[1418]: E0209 01:08:10.416745 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.416892 kubelet[1418]: E0209 01:08:10.416878 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.416892 kubelet[1418]: W0209 01:08:10.416886 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.416892 kubelet[1418]: E0209 01:08:10.416894 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.417031 kubelet[1418]: E0209 01:08:10.417018 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.417031 kubelet[1418]: W0209 01:08:10.417025 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.417031 kubelet[1418]: E0209 01:08:10.417033 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.489095 kubelet[1418]: E0209 01:08:10.489074 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.489095 kubelet[1418]: W0209 01:08:10.489090 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.489168 kubelet[1418]: E0209 01:08:10.489107 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.489293 kubelet[1418]: E0209 01:08:10.489275 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.489293 kubelet[1418]: W0209 01:08:10.489285 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.489358 kubelet[1418]: E0209 01:08:10.489297 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.489515 kubelet[1418]: E0209 01:08:10.489503 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.489515 kubelet[1418]: W0209 01:08:10.489512 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.489515 kubelet[1418]: E0209 01:08:10.489525 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.489751 kubelet[1418]: E0209 01:08:10.489737 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.489751 kubelet[1418]: W0209 01:08:10.489746 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.489831 kubelet[1418]: E0209 01:08:10.489762 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.489911 kubelet[1418]: E0209 01:08:10.489897 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.489911 kubelet[1418]: W0209 01:08:10.489909 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.489960 kubelet[1418]: E0209 01:08:10.489929 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.490146 kubelet[1418]: E0209 01:08:10.490125 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.490192 kubelet[1418]: W0209 01:08:10.490145 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.490192 kubelet[1418]: E0209 01:08:10.490172 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.490418 kubelet[1418]: E0209 01:08:10.490403 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.490418 kubelet[1418]: W0209 01:08:10.490414 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.490482 kubelet[1418]: E0209 01:08:10.490431 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.490582 kubelet[1418]: E0209 01:08:10.490569 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.490582 kubelet[1418]: W0209 01:08:10.490578 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.490631 kubelet[1418]: E0209 01:08:10.490590 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.490720 kubelet[1418]: E0209 01:08:10.490710 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.490720 kubelet[1418]: W0209 01:08:10.490718 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.490770 kubelet[1418]: E0209 01:08:10.490731 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.490902 kubelet[1418]: E0209 01:08:10.490892 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.490902 kubelet[1418]: W0209 01:08:10.490900 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.490950 kubelet[1418]: E0209 01:08:10.490913 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.491101 kubelet[1418]: E0209 01:08:10.491084 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.491101 kubelet[1418]: W0209 01:08:10.491095 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.491189 kubelet[1418]: E0209 01:08:10.491109 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:10.491251 kubelet[1418]: E0209 01:08:10.491239 1418 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 01:08:10.491251 kubelet[1418]: W0209 01:08:10.491248 1418 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 01:08:10.491296 kubelet[1418]: E0209 01:08:10.491257 1418 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 01:08:11.193297 kubelet[1418]: E0209 01:08:11.193267 1418 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:11.204436 kubelet[1418]: E0209 01:08:11.204402 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:11.316888 kubelet[1418]: E0209 01:08:11.316842 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:12.205021 kubelet[1418]: E0209 01:08:12.204978 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:12.437119 env[1112]: time="2024-02-09T01:08:12.437072498Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:12.438632 env[1112]: time="2024-02-09T01:08:12.438606931Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:12.440287 env[1112]: time="2024-02-09T01:08:12.440244694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:12.442670 env[1112]: time="2024-02-09T01:08:12.442641196Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:12.443462 env[1112]: time="2024-02-09T01:08:12.443437449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 01:08:12.443733 kubelet[1418]: E0209 01:08:12.443702 1418 kuberuntime_manager.go:872] init container &Container{Name:flexvol-driver,Image:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:flexvol-driver-host,ReadOnly:false,MountPath:/host/driver,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vtpnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-node-xsks4_calico-system(b37281cd-2819-42cc-8dfd-2d068ad756b5): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Feb 9 01:08:12.443733 kubelet[1418]: E0209 01:08:12.443738 1418 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"flexvol-driver\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="calico-system/calico-node-xsks4" podUID=b37281cd-2819-42cc-8dfd-2d068ad756b5 Feb 9 01:08:13.205979 kubelet[1418]: E0209 01:08:13.205947 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:13.317108 kubelet[1418]: E0209 01:08:13.317066 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:13.346227 kubelet[1418]: E0209 01:08:13.346190 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:13.347984 env[1112]: time="2024-02-09T01:08:13.347918214Z" level=info msg="CreateContainer within sandbox \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 01:08:13.360049 env[1112]: time="2024-02-09T01:08:13.360000131Z" level=info msg="CreateContainer within sandbox \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434\"" Feb 9 01:08:13.360612 env[1112]: time="2024-02-09T01:08:13.360589775Z" level=info msg="StartContainer for \"4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434\"" Feb 9 01:08:13.375469 systemd[1]: run-containerd-runc-k8s.io-4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434-runc.KECUJE.mount: Deactivated successfully. Feb 9 01:08:13.377297 systemd[1]: Started cri-containerd-4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434.scope. Feb 9 01:08:13.387000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.390948 kernel: kauditd_printk_skb: 109 callbacks suppressed Feb 9 01:08:13.390987 kernel: audit: type=1400 audit(1707440893.387:613): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.387000 audit[1637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1537 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:13.393935 kernel: audit: type=1300 audit(1707440893.387:613): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1537 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:13.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653835373165653839303062666633303036613935633135633131 Feb 9 01:08:13.396646 kernel: audit: type=1327 audit(1707440893.387:613): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653835373165653839303062666633303036613935633135633131 Feb 9 01:08:13.396685 kernel: audit: type=1400 audit(1707440893.394:614): avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.400506 kernel: audit: type=1400 audit(1707440893.394:614): avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.400537 kernel: audit: type=1400 audit(1707440893.394:614): avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.404334 kernel: audit: type=1400 audit(1707440893.394:614): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.404357 kernel: audit: type=1400 audit(1707440893.394:614): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.410844 kernel: audit: type=1400 audit(1707440893.394:614): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.410878 kernel: audit: type=1400 audit(1707440893.394:614): avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.394000 audit: BPF prog-id=75 op=LOAD Feb 9 01:08:13.394000 audit[1637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022f2d0 items=0 ppid=1537 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:13.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653835373165653839303062666633303036613935633135633131 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.397000 audit: BPF prog-id=76 op=LOAD Feb 9 01:08:13.397000 audit[1637]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022f318 items=0 ppid=1537 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:13.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653835373165653839303062666633303036613935633135633131 Feb 9 01:08:13.401000 audit: BPF prog-id=76 op=UNLOAD Feb 9 01:08:13.401000 audit: BPF prog-id=75 op=UNLOAD Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { perfmon } for pid=1637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit[1637]: AVC avc: denied { bpf } for pid=1637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:13.401000 audit: BPF prog-id=77 op=LOAD Feb 9 01:08:13.401000 audit[1637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022f3a8 items=0 ppid=1537 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:13.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461653835373165653839303062666633303036613935633135633131 Feb 9 01:08:13.418165 env[1112]: time="2024-02-09T01:08:13.418133023Z" level=info msg="StartContainer for \"4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434\" returns successfully" Feb 9 01:08:13.426586 systemd[1]: cri-containerd-4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434.scope: Deactivated successfully. Feb 9 01:08:13.430000 audit: BPF prog-id=77 op=UNLOAD Feb 9 01:08:13.943557 env[1112]: time="2024-02-09T01:08:13.943501507Z" level=info msg="shim disconnected" id=4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434 Feb 9 01:08:13.943557 env[1112]: time="2024-02-09T01:08:13.943551133Z" level=warning msg="cleaning up after shim disconnected" id=4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434 namespace=k8s.io Feb 9 01:08:13.943557 env[1112]: time="2024-02-09T01:08:13.943563707Z" level=info msg="cleaning up dead shim" Feb 9 01:08:13.950230 env[1112]: time="2024-02-09T01:08:13.950195430Z" level=warning msg="cleanup warnings time=\"2024-02-09T01:08:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1679 runtime=io.containerd.runc.v2\n" Feb 9 01:08:14.207161 kubelet[1418]: E0209 01:08:14.207042 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:14.348559 kubelet[1418]: E0209 01:08:14.348528 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:14.349247 env[1112]: time="2024-02-09T01:08:14.349214738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 01:08:14.355450 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4ae8571ee8900bff3006a95c15c1104702e9d954f5a9141484089aabdd677434-rootfs.mount: Deactivated successfully. Feb 9 01:08:15.208186 kubelet[1418]: E0209 01:08:15.208145 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:15.317019 kubelet[1418]: E0209 01:08:15.316985 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:15.852717 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4227884827.mount: Deactivated successfully. Feb 9 01:08:16.208875 kubelet[1418]: E0209 01:08:16.208852 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:17.209599 kubelet[1418]: E0209 01:08:17.209568 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:17.317054 kubelet[1418]: E0209 01:08:17.317026 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:18.209938 kubelet[1418]: E0209 01:08:18.209903 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:19.210605 kubelet[1418]: E0209 01:08:19.210577 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:19.227148 env[1112]: time="2024-02-09T01:08:19.227112509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:19.228647 env[1112]: time="2024-02-09T01:08:19.228624392Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:19.230073 env[1112]: time="2024-02-09T01:08:19.230052274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:19.231531 env[1112]: time="2024-02-09T01:08:19.231507117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:19.232086 env[1112]: time="2024-02-09T01:08:19.232055844Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 01:08:19.233551 env[1112]: time="2024-02-09T01:08:19.233523252Z" level=info msg="CreateContainer within sandbox \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 01:08:19.246423 env[1112]: time="2024-02-09T01:08:19.246384865Z" level=info msg="CreateContainer within sandbox \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\"" Feb 9 01:08:19.246800 env[1112]: time="2024-02-09T01:08:19.246771152Z" level=info msg="StartContainer for \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\"" Feb 9 01:08:19.263573 systemd[1]: Started cri-containerd-31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888.scope. Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274535 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 01:08:19.274598 kernel: audit: type=1400 audit(1707440899.273:620): avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1537 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:19.279344 kernel: audit: type=1300 audit(1707440899.273:620): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1537 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:19.279385 kernel: audit: type=1327 audit(1707440899.273:620): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626431616336643338636635386262646639396336303730326635 Feb 9 01:08:19.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626431616336643338636635386262646639396336303730326635 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.283995 kernel: audit: type=1400 audit(1707440899.273:621): avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.284024 kernel: audit: type=1400 audit(1707440899.273:621): avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.287839 kernel: audit: type=1400 audit(1707440899.273:621): avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.287880 kernel: audit: type=1400 audit(1707440899.273:621): avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.292929 kernel: audit: type=1400 audit(1707440899.273:621): avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.292972 kernel: audit: type=1400 audit(1707440899.273:621): avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.294380 kernel: audit: type=1400 audit(1707440899.273:621): avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.295843 env[1112]: time="2024-02-09T01:08:19.295812308Z" level=info msg="StartContainer for \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\" returns successfully" Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.273000 audit: BPF prog-id=78 op=LOAD Feb 9 01:08:19.273000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000339ee0 items=0 ppid=1537 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:19.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626431616336643338636635386262646639396336303730326635 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.274000 audit: BPF prog-id=79 op=LOAD Feb 9 01:08:19.274000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000339f28 items=0 ppid=1537 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:19.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626431616336643338636635386262646639396336303730326635 Feb 9 01:08:19.279000 audit: BPF prog-id=79 op=UNLOAD Feb 9 01:08:19.279000 audit: BPF prog-id=78 op=UNLOAD Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { perfmon } for pid=1700 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit[1700]: AVC avc: denied { bpf } for pid=1700 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:19.279000 audit: BPF prog-id=80 op=LOAD Feb 9 01:08:19.279000 audit[1700]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000339fb8 items=0 ppid=1537 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:19.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331626431616336643338636635386262646639396336303730326635 Feb 9 01:08:19.317243 kubelet[1418]: E0209 01:08:19.317173 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:19.360828 kubelet[1418]: E0209 01:08:19.358638 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:20.211495 kubelet[1418]: E0209 01:08:20.211464 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:20.240441 systemd[1]: run-containerd-runc-k8s.io-31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888-runc.5RdOPE.mount: Deactivated successfully. Feb 9 01:08:21.211807 kubelet[1418]: E0209 01:08:21.211776 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:21.316559 kubelet[1418]: E0209 01:08:21.316536 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:22.212747 kubelet[1418]: E0209 01:08:22.212712 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:23.213171 kubelet[1418]: E0209 01:08:23.213143 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:23.316644 kubelet[1418]: E0209 01:08:23.316609 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:23.808015 update_engine[1102]: I0209 01:08:23.807977 1102 update_attempter.cc:509] Updating boot flags... Feb 9 01:08:24.213885 kubelet[1418]: E0209 01:08:24.213861 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:25.214002 kubelet[1418]: E0209 01:08:25.213972 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:25.317421 kubelet[1418]: E0209 01:08:25.317393 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:25.317421 kubelet[1418]: E0209 01:08:25.317425 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:25.318792 env[1112]: time="2024-02-09T01:08:25.318755392Z" level=info msg="CreateContainer within sandbox \"2eaf104744fdbfebbb592629628060f84fc50e439b0e34f64a87f6171ae99018\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 01:08:25.710046 env[1112]: time="2024-02-09T01:08:25.710005815Z" level=info msg="CreateContainer within sandbox \"2eaf104744fdbfebbb592629628060f84fc50e439b0e34f64a87f6171ae99018\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d40e5aa565bd1e3507855c1d8837f28c3b9f02c43f9df13f93863395933b9f83\"" Feb 9 01:08:25.710371 env[1112]: time="2024-02-09T01:08:25.710331613Z" level=info msg="StartContainer for \"d40e5aa565bd1e3507855c1d8837f28c3b9f02c43f9df13f93863395933b9f83\"" Feb 9 01:08:25.725311 systemd[1]: Started cri-containerd-d40e5aa565bd1e3507855c1d8837f28c3b9f02c43f9df13f93863395933b9f83.scope. Feb 9 01:08:25.734000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.738131 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 01:08:25.738181 kernel: audit: type=1400 audit(1707440905.734:626): avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.738202 kernel: audit: type=1300 audit(1707440905.734:626): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1536 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.734000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1536 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306535616135363562643165333530373835356331643838333766 Feb 9 01:08:25.743738 kernel: audit: type=1327 audit(1707440905.734:626): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306535616135363562643165333530373835356331643838333766 Feb 9 01:08:25.743779 kernel: audit: type=1400 audit(1707440905.735:627): avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.745711 kernel: audit: type=1400 audit(1707440905.735:627): avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.747605 kernel: audit: type=1400 audit(1707440905.735:627): avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.751441 kernel: audit: type=1400 audit(1707440905.735:627): avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.751492 kernel: audit: type=1400 audit(1707440905.735:627): avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.753386 kernel: audit: type=1400 audit(1707440905.735:627): avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.757389 kernel: audit: type=1400 audit(1707440905.735:627): avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.735000 audit: BPF prog-id=81 op=LOAD Feb 9 01:08:25.735000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000dfbe0 items=0 ppid=1536 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306535616135363562643165333530373835356331643838333766 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.736000 audit: BPF prog-id=82 op=LOAD Feb 9 01:08:25.736000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000dfc28 items=0 ppid=1536 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306535616135363562643165333530373835356331643838333766 Feb 9 01:08:25.739000 audit: BPF prog-id=82 op=UNLOAD Feb 9 01:08:25.739000 audit: BPF prog-id=81 op=UNLOAD Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:25.739000 audit: BPF prog-id=83 op=LOAD Feb 9 01:08:25.739000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000dfcb8 items=0 ppid=1536 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306535616135363562643165333530373835356331643838333766 Feb 9 01:08:25.760555 env[1112]: time="2024-02-09T01:08:25.760522170Z" level=info msg="StartContainer for \"d40e5aa565bd1e3507855c1d8837f28c3b9f02c43f9df13f93863395933b9f83\" returns successfully" Feb 9 01:08:25.796000 audit[1808]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.796000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c2dc8a0 a2=0 a3=7ffd9c2dc88c items=0 ppid=1768 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 01:08:25.797000 audit[1809]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.797000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb8b41210 a2=0 a3=7fffb8b411fc items=0 ppid=1768 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 01:08:25.797000 audit[1810]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.797000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd805f6c40 a2=0 a3=7ffd805f6c2c items=0 ppid=1768 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 01:08:25.798000 audit[1812]: NETFILTER_CFG table=nat:38 family=10 entries=1 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.798000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeed66c8d0 a2=0 a3=7ffeed66c8bc items=0 ppid=1768 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.798000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 01:08:25.799000 audit[1813]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.799000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0476acf0 a2=0 a3=7ffd0476acdc items=0 ppid=1768 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 01:08:25.799000 audit[1814]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.799000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef2726550 a2=0 a3=7ffef272653c items=0 ppid=1768 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 01:08:25.897000 audit[1815]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.897000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5744e530 a2=0 a3=7ffe5744e51c items=0 ppid=1768 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 01:08:25.898000 audit[1817]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.898000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe724c2b90 a2=0 a3=7ffe724c2b7c items=0 ppid=1768 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 01:08:25.901000 audit[1820]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.901000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb061b130 a2=0 a3=7ffdb061b11c items=0 ppid=1768 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 01:08:25.901000 audit[1821]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.901000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1eff5ec0 a2=0 a3=7ffd1eff5eac items=0 ppid=1768 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 01:08:25.903000 audit[1823]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.903000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffda835c70 a2=0 a3=7fffda835c5c items=0 ppid=1768 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 01:08:25.904000 audit[1824]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.904000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecbaddd70 a2=0 a3=7ffecbaddd5c items=0 ppid=1768 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 01:08:25.906000 audit[1826]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.906000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe7ab20dc0 a2=0 a3=7ffe7ab20dac items=0 ppid=1768 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 01:08:25.908000 audit[1829]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.908000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc23480e80 a2=0 a3=7ffc23480e6c items=0 ppid=1768 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 01:08:25.909000 audit[1830]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.909000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7d9de2f0 a2=0 a3=7ffd7d9de2dc items=0 ppid=1768 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 01:08:25.911000 audit[1832]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.911000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff06964ee0 a2=0 a3=7fff06964ecc items=0 ppid=1768 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 01:08:25.912000 audit[1833]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.912000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff50822930 a2=0 a3=7fff5082291c items=0 ppid=1768 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 01:08:25.913000 audit[1835]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.913000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff984edb60 a2=0 a3=7fff984edb4c items=0 ppid=1768 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 01:08:25.916000 audit[1838]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.916000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff03eefb0 a2=0 a3=7ffff03eef9c items=0 ppid=1768 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 01:08:25.919000 audit[1841]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.919000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd63ccee20 a2=0 a3=7ffd63ccee0c items=0 ppid=1768 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 01:08:25.919000 audit[1842]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.919000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce3c39250 a2=0 a3=7ffce3c3923c items=0 ppid=1768 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 01:08:25.921000 audit[1844]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.921000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc4365e6f0 a2=0 a3=7ffc4365e6dc items=0 ppid=1768 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.921000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 01:08:25.923000 audit[1847]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 01:08:25.923000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffff2f82fd0 a2=0 a3=7ffff2f82fbc items=0 ppid=1768 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 01:08:25.927000 audit[1851]: NETFILTER_CFG table=filter:58 family=2 entries=3 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:08:25.927000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff77638310 a2=0 a3=7fff776382fc items=0 ppid=1768 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:08:25.936000 audit[1851]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:08:25.936000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff77638310 a2=0 a3=7fff776382fc items=0 ppid=1768 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:08:25.949000 audit[1857]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.949000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd9a83bda0 a2=0 a3=7ffd9a83bd8c items=0 ppid=1768 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 01:08:25.951000 audit[1859]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.951000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe16236280 a2=0 a3=7ffe1623626c items=0 ppid=1768 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 01:08:25.953000 audit[1862]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.953000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcae31d30 a2=0 a3=7fffcae31d1c items=0 ppid=1768 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 01:08:25.954000 audit[1863]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.954000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1bdc3960 a2=0 a3=7fff1bdc394c items=0 ppid=1768 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 01:08:25.956000 audit[1865]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.956000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6366bb30 a2=0 a3=7fff6366bb1c items=0 ppid=1768 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 01:08:25.957000 audit[1866]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.957000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd60f79b40 a2=0 a3=7ffd60f79b2c items=0 ppid=1768 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 01:08:25.958000 audit[1868]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.958000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff84aa6ff0 a2=0 a3=7fff84aa6fdc items=0 ppid=1768 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 01:08:25.961000 audit[1871]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.961000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc964140f0 a2=0 a3=7ffc964140dc items=0 ppid=1768 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 01:08:25.962000 audit[1872]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.962000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1b4e8920 a2=0 a3=7fff1b4e890c items=0 ppid=1768 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.962000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 01:08:25.964000 audit[1874]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.964000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd612a200 a2=0 a3=7ffcd612a1ec items=0 ppid=1768 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 01:08:25.965000 audit[1875]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.965000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7d5581f0 a2=0 a3=7ffc7d5581dc items=0 ppid=1768 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 01:08:25.966000 audit[1877]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.966000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7379c950 a2=0 a3=7ffe7379c93c items=0 ppid=1768 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 01:08:25.969000 audit[1880]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.969000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc82e8e6d0 a2=0 a3=7ffc82e8e6bc items=0 ppid=1768 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 01:08:25.971000 audit[1883]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.971000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff54305d20 a2=0 a3=7fff54305d0c items=0 ppid=1768 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 01:08:25.972000 audit[1884]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.972000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe15be6f50 a2=0 a3=7ffe15be6f3c items=0 ppid=1768 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 01:08:25.974000 audit[1886]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.974000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff61198d90 a2=0 a3=7fff61198d7c items=0 ppid=1768 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 01:08:25.976000 audit[1889]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 01:08:25.976000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc5ddec2c0 a2=0 a3=7ffc5ddec2ac items=0 ppid=1768 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 01:08:25.980000 audit[1893]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 01:08:25.980000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff76669ff0 a2=0 a3=7fff76669fdc items=0 ppid=1768 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.980000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:08:25.981000 audit[1893]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 01:08:25.981000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff76669ff0 a2=0 a3=7fff76669fdc items=0 ppid=1768 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:25.981000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:08:26.214688 kubelet[1418]: E0209 01:08:26.214615 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:26.366341 kubelet[1418]: E0209 01:08:26.366321 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:26.372543 kubelet[1418]: I0209 01:08:26.372513 1418 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-5p8jc" podStartSLOduration=-9.223372014482306e+09 pod.CreationTimestamp="2024-02-09 01:08:04 +0000 UTC" firstStartedPulling="2024-02-09 01:08:08.586331109 +0000 UTC m=+17.762313494" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 01:08:26.372172123 +0000 UTC m=+35.548154508" watchObservedRunningTime="2024-02-09 01:08:26.372470749 +0000 UTC m=+35.548453134" Feb 9 01:08:27.215564 kubelet[1418]: E0209 01:08:27.215538 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:27.317292 kubelet[1418]: E0209 01:08:27.317256 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:28.216032 kubelet[1418]: E0209 01:08:28.216001 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:29.216283 kubelet[1418]: E0209 01:08:29.216236 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:29.316937 kubelet[1418]: E0209 01:08:29.316906 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:30.216930 kubelet[1418]: E0209 01:08:30.216895 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:31.193598 kubelet[1418]: E0209 01:08:31.193568 1418 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:31.217509 kubelet[1418]: E0209 01:08:31.217482 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:31.316821 kubelet[1418]: E0209 01:08:31.316788 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:32.217769 kubelet[1418]: E0209 01:08:32.217714 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:33.218324 kubelet[1418]: E0209 01:08:33.218288 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:33.316693 kubelet[1418]: E0209 01:08:33.316668 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:34.218961 kubelet[1418]: E0209 01:08:34.218939 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:35.219800 kubelet[1418]: E0209 01:08:35.219776 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:35.317235 kubelet[1418]: E0209 01:08:35.317214 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:36.220420 kubelet[1418]: E0209 01:08:36.220393 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:37.220756 kubelet[1418]: E0209 01:08:37.220730 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:37.317210 kubelet[1418]: E0209 01:08:37.317193 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:38.221480 kubelet[1418]: E0209 01:08:38.221454 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:39.221862 kubelet[1418]: E0209 01:08:39.221840 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:39.316650 kubelet[1418]: E0209 01:08:39.316625 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:40.222255 kubelet[1418]: E0209 01:08:40.222220 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:41.222468 kubelet[1418]: E0209 01:08:41.222438 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:41.316746 kubelet[1418]: E0209 01:08:41.316726 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:42.223130 kubelet[1418]: E0209 01:08:42.223087 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:43.224147 kubelet[1418]: E0209 01:08:43.224111 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:43.316511 kubelet[1418]: E0209 01:08:43.316487 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:44.224998 kubelet[1418]: E0209 01:08:44.224949 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:45.225584 kubelet[1418]: E0209 01:08:45.225554 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:45.316498 kubelet[1418]: E0209 01:08:45.316478 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:46.225814 kubelet[1418]: E0209 01:08:46.225798 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:47.226723 kubelet[1418]: E0209 01:08:47.226696 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:47.317143 kubelet[1418]: E0209 01:08:47.317126 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:48.227136 kubelet[1418]: E0209 01:08:48.227113 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:49.228081 kubelet[1418]: E0209 01:08:49.228054 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:49.316835 kubelet[1418]: E0209 01:08:49.316800 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:50.228526 kubelet[1418]: E0209 01:08:50.228491 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:50.362664 systemd[1]: cri-containerd-31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888.scope: Deactivated successfully. Feb 9 01:08:50.368000 audit: BPF prog-id=80 op=UNLOAD Feb 9 01:08:50.370803 kernel: kauditd_printk_skb: 165 callbacks suppressed Feb 9 01:08:50.370936 kernel: audit: type=1334 audit(1707440930.368:676): prog-id=80 op=UNLOAD Feb 9 01:08:50.379579 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888-rootfs.mount: Deactivated successfully. Feb 9 01:08:50.410940 env[1112]: time="2024-02-09T01:08:50.410894615Z" level=info msg="shim disconnected" id=31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888 Feb 9 01:08:50.411202 env[1112]: time="2024-02-09T01:08:50.410941082Z" level=warning msg="cleaning up after shim disconnected" id=31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888 namespace=k8s.io Feb 9 01:08:50.411202 env[1112]: time="2024-02-09T01:08:50.410952814Z" level=info msg="cleaning up dead shim" Feb 9 01:08:50.416769 env[1112]: time="2024-02-09T01:08:50.416729290Z" level=warning msg="cleanup warnings time=\"2024-02-09T01:08:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1908 runtime=io.containerd.runc.v2\n" Feb 9 01:08:51.193695 kubelet[1418]: E0209 01:08:51.193663 1418 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:51.229426 kubelet[1418]: E0209 01:08:51.229399 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:51.316589 kubelet[1418]: E0209 01:08:51.316560 1418 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:51.395378 kubelet[1418]: E0209 01:08:51.395343 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:51.396729 env[1112]: time="2024-02-09T01:08:51.396691893Z" level=info msg="CreateContainer within sandbox \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\" for container &ContainerMetadata{Name:install-cni,Attempt:1,}" Feb 9 01:08:51.410889 env[1112]: time="2024-02-09T01:08:51.410856700Z" level=info msg="CreateContainer within sandbox \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\" for &ContainerMetadata{Name:install-cni,Attempt:1,} returns container id \"6a4c7ecceb045f31aa2a3867d115e8702f6a653c78fb075354d5b8f7d4fe4cbe\"" Feb 9 01:08:51.411211 env[1112]: time="2024-02-09T01:08:51.411181771Z" level=info msg="StartContainer for \"6a4c7ecceb045f31aa2a3867d115e8702f6a653c78fb075354d5b8f7d4fe4cbe\"" Feb 9 01:08:51.426500 systemd[1]: Started cri-containerd-6a4c7ecceb045f31aa2a3867d115e8702f6a653c78fb075354d5b8f7d4fe4cbe.scope. Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1537 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:51.442048 kernel: audit: type=1400 audit(1707440931.435:677): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.442126 kernel: audit: type=1300 audit(1707440931.435:677): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1537 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:51.442154 kernel: audit: type=1327 audit(1707440931.435:677): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346337656363656230343566333161613261333836376431313565 Feb 9 01:08:51.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346337656363656230343566333161613261333836376431313565 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.446818 kernel: audit: type=1400 audit(1707440931.435:678): avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.446880 kernel: audit: type=1400 audit(1707440931.435:678): avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.450900 kernel: audit: type=1400 audit(1707440931.435:678): avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.450939 kernel: audit: type=1400 audit(1707440931.435:678): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.452833 kernel: audit: type=1400 audit(1707440931.435:678): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.454768 kernel: audit: type=1400 audit(1707440931.435:678): avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.435000 audit: BPF prog-id=84 op=LOAD Feb 9 01:08:51.435000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001ba690 items=0 ppid=1537 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:51.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346337656363656230343566333161613261333836376431313565 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.437000 audit: BPF prog-id=85 op=LOAD Feb 9 01:08:51.437000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001ba6d8 items=0 ppid=1537 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:51.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346337656363656230343566333161613261333836376431313565 Feb 9 01:08:51.440000 audit: BPF prog-id=85 op=UNLOAD Feb 9 01:08:51.440000 audit: BPF prog-id=84 op=UNLOAD Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { perfmon } for pid=1929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit[1929]: AVC avc: denied { bpf } for pid=1929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:51.440000 audit: BPF prog-id=86 op=LOAD Feb 9 01:08:51.440000 audit[1929]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001ba768 items=0 ppid=1537 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:51.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661346337656363656230343566333161613261333836376431313565 Feb 9 01:08:51.462472 env[1112]: time="2024-02-09T01:08:51.462434175Z" level=info msg="StartContainer for \"6a4c7ecceb045f31aa2a3867d115e8702f6a653c78fb075354d5b8f7d4fe4cbe\" returns successfully" Feb 9 01:08:51.619209 systemd[1]: cri-containerd-6a4c7ecceb045f31aa2a3867d115e8702f6a653c78fb075354d5b8f7d4fe4cbe.scope: Deactivated successfully. Feb 9 01:08:51.621000 audit: BPF prog-id=86 op=UNLOAD Feb 9 01:08:51.640043 env[1112]: time="2024-02-09T01:08:51.639994594Z" level=info msg="shim disconnected" id=6a4c7ecceb045f31aa2a3867d115e8702f6a653c78fb075354d5b8f7d4fe4cbe Feb 9 01:08:51.640156 env[1112]: time="2024-02-09T01:08:51.640044678Z" level=warning msg="cleaning up after shim disconnected" id=6a4c7ecceb045f31aa2a3867d115e8702f6a653c78fb075354d5b8f7d4fe4cbe namespace=k8s.io Feb 9 01:08:51.640156 env[1112]: time="2024-02-09T01:08:51.640054166Z" level=info msg="cleaning up dead shim" Feb 9 01:08:51.645708 env[1112]: time="2024-02-09T01:08:51.645682442Z" level=warning msg="cleanup warnings time=\"2024-02-09T01:08:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1978 runtime=io.containerd.runc.v2\n" Feb 9 01:08:51.647221 kubelet[1418]: I0209 01:08:51.647188 1418 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 01:08:52.230181 kubelet[1418]: E0209 01:08:52.230156 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:52.397553 kubelet[1418]: I0209 01:08:52.397533 1418 scope.go:115] "RemoveContainer" containerID="31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888" Feb 9 01:08:52.397772 kubelet[1418]: I0209 01:08:52.397754 1418 scope.go:115] "RemoveContainer" containerID="31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888" Feb 9 01:08:52.398782 env[1112]: time="2024-02-09T01:08:52.398751150Z" level=info msg="RemoveContainer for \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\"" Feb 9 01:08:52.398860 env[1112]: time="2024-02-09T01:08:52.398835639Z" level=info msg="RemoveContainer for \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\"" Feb 9 01:08:52.398989 env[1112]: time="2024-02-09T01:08:52.398942179Z" level=error msg="RemoveContainer for \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\" failed" error="failed to set removing state for container \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\": container is already in removing state" Feb 9 01:08:52.399125 kubelet[1418]: E0209 01:08:52.399107 1418 remote_runtime.go:368] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\": container is already in removing state" containerID="31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888" Feb 9 01:08:52.399191 kubelet[1418]: E0209 01:08:52.399144 1418 kuberuntime_container.go:784] failed to remove pod init container "install-cni": rpc error: code = Unknown desc = failed to set removing state for container "31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888": container is already in removing state; Skipping pod "calico-node-xsks4_calico-system(b37281cd-2819-42cc-8dfd-2d068ad756b5)" Feb 9 01:08:52.399220 kubelet[1418]: E0209 01:08:52.399194 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:52.399918 env[1112]: time="2024-02-09T01:08:52.399881514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 01:08:52.401379 env[1112]: time="2024-02-09T01:08:52.401339803Z" level=info msg="RemoveContainer for \"31bd1ac6d38cf58bbdf99c60702f5ea9147d5778f9d7544f99fbe174b7135888\" returns successfully" Feb 9 01:08:52.405626 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6a4c7ecceb045f31aa2a3867d115e8702f6a653c78fb075354d5b8f7d4fe4cbe-rootfs.mount: Deactivated successfully. Feb 9 01:08:53.230262 kubelet[1418]: E0209 01:08:53.230229 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:53.324862 systemd[1]: Created slice kubepods-besteffort-pod5d1dd464_a956_48ec_83e2_549250dfbace.slice. Feb 9 01:08:53.326980 env[1112]: time="2024-02-09T01:08:53.326928392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5rhlm,Uid:5d1dd464-a956-48ec-83e2-549250dfbace,Namespace:calico-system,Attempt:0,}" Feb 9 01:08:53.370556 env[1112]: time="2024-02-09T01:08:53.370473263Z" level=error msg="Failed to destroy network for sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:53.370835 env[1112]: time="2024-02-09T01:08:53.370803172Z" level=error msg="encountered an error cleaning up failed sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:53.370899 env[1112]: time="2024-02-09T01:08:53.370850923Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5rhlm,Uid:5d1dd464-a956-48ec-83e2-549250dfbace,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:53.371087 kubelet[1418]: E0209 01:08:53.371067 1418 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:53.371156 kubelet[1418]: E0209 01:08:53.371127 1418 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5rhlm" Feb 9 01:08:53.371156 kubelet[1418]: E0209 01:08:53.371148 1418 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5rhlm" Feb 9 01:08:53.371210 kubelet[1418]: E0209 01:08:53.371200 1418 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5rhlm_calico-system(5d1dd464-a956-48ec-83e2-549250dfbace)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5rhlm_calico-system(5d1dd464-a956-48ec-83e2-549250dfbace)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:53.371724 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7-shm.mount: Deactivated successfully. Feb 9 01:08:53.401488 kubelet[1418]: I0209 01:08:53.401460 1418 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Feb 9 01:08:53.402024 env[1112]: time="2024-02-09T01:08:53.401988926Z" level=info msg="StopPodSandbox for \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\"" Feb 9 01:08:53.422125 env[1112]: time="2024-02-09T01:08:53.422083274Z" level=error msg="StopPodSandbox for \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\" failed" error="failed to destroy network for sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:53.422285 kubelet[1418]: E0209 01:08:53.422262 1418 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Feb 9 01:08:53.422338 kubelet[1418]: E0209 01:08:53.422313 1418 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7} Feb 9 01:08:53.422379 kubelet[1418]: E0209 01:08:53.422345 1418 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5d1dd464-a956-48ec-83e2-549250dfbace\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 01:08:53.422434 kubelet[1418]: E0209 01:08:53.422385 1418 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5d1dd464-a956-48ec-83e2-549250dfbace\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5rhlm" podUID=5d1dd464-a956-48ec-83e2-549250dfbace Feb 9 01:08:54.231154 kubelet[1418]: E0209 01:08:54.231117 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:55.231688 kubelet[1418]: E0209 01:08:55.231652 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:56.231843 kubelet[1418]: E0209 01:08:56.231811 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:56.816659 kubelet[1418]: I0209 01:08:56.816617 1418 topology_manager.go:210] "Topology Admit Handler" Feb 9 01:08:56.820930 systemd[1]: Created slice kubepods-besteffort-podb7471f81_6255_4738_b8b4_fcefd2016644.slice. Feb 9 01:08:56.985849 kubelet[1418]: I0209 01:08:56.985799 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-scs4r\" (UniqueName: \"kubernetes.io/projected/b7471f81-6255-4738-b8b4-fcefd2016644-kube-api-access-scs4r\") pod \"nginx-deployment-8ffc5cf85-h4nqf\" (UID: \"b7471f81-6255-4738-b8b4-fcefd2016644\") " pod="default/nginx-deployment-8ffc5cf85-h4nqf" Feb 9 01:08:57.123720 env[1112]: time="2024-02-09T01:08:57.123640284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-h4nqf,Uid:b7471f81-6255-4738-b8b4-fcefd2016644,Namespace:default,Attempt:0,}" Feb 9 01:08:57.232112 kubelet[1418]: E0209 01:08:57.232087 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:57.947855 env[1112]: time="2024-02-09T01:08:57.947783991Z" level=error msg="Failed to destroy network for sandbox \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:57.948157 env[1112]: time="2024-02-09T01:08:57.948123348Z" level=error msg="encountered an error cleaning up failed sandbox \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:57.948208 env[1112]: time="2024-02-09T01:08:57.948172159Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-h4nqf,Uid:b7471f81-6255-4738-b8b4-fcefd2016644,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:57.948407 kubelet[1418]: E0209 01:08:57.948383 1418 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 01:08:57.948470 kubelet[1418]: E0209 01:08:57.948436 1418 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-h4nqf" Feb 9 01:08:57.948470 kubelet[1418]: E0209 01:08:57.948455 1418 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-h4nqf" Feb 9 01:08:57.948522 kubelet[1418]: E0209 01:08:57.948502 1418 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-h4nqf_default(b7471f81-6255-4738-b8b4-fcefd2016644)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-h4nqf_default(b7471f81-6255-4738-b8b4-fcefd2016644)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-h4nqf" podUID=b7471f81-6255-4738-b8b4-fcefd2016644 Feb 9 01:08:57.949192 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2-shm.mount: Deactivated successfully. Feb 9 01:08:58.085036 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount522440707.mount: Deactivated successfully. Feb 9 01:08:58.123379 env[1112]: time="2024-02-09T01:08:58.123320730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:58.124866 env[1112]: time="2024-02-09T01:08:58.124826377Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:58.126154 env[1112]: time="2024-02-09T01:08:58.126122420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:58.127320 env[1112]: time="2024-02-09T01:08:58.127291706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:08:58.127673 env[1112]: time="2024-02-09T01:08:58.127646071Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 01:08:58.136808 env[1112]: time="2024-02-09T01:08:58.136775572Z" level=info msg="CreateContainer within sandbox \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 01:08:58.149751 env[1112]: time="2024-02-09T01:08:58.149718964Z" level=info msg="CreateContainer within sandbox \"a461be59585f37f69f03de660bd4fed1afb2fe44781f1842da9cdf1e4e1fa287\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f2cfd27b901ca7581f8dbc95533a1e2892396060b7a03b56512177f57de3a973\"" Feb 9 01:08:58.150119 env[1112]: time="2024-02-09T01:08:58.150090581Z" level=info msg="StartContainer for \"f2cfd27b901ca7581f8dbc95533a1e2892396060b7a03b56512177f57de3a973\"" Feb 9 01:08:58.163730 systemd[1]: Started cri-containerd-f2cfd27b901ca7581f8dbc95533a1e2892396060b7a03b56512177f57de3a973.scope. Feb 9 01:08:58.179423 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 9 01:08:58.179553 kernel: audit: type=1400 audit(1707440938.176:684): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1537 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.183695 kernel: audit: type=1300 audit(1707440938.176:684): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1537 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.183744 kernel: audit: type=1327 audit(1707440938.176:684): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632636664323762393031636137353831663864626339353533336131 Feb 9 01:08:58.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632636664323762393031636137353831663864626339353533336131 Feb 9 01:08:58.186403 kernel: audit: type=1400 audit(1707440938.176:685): avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.188265 kernel: audit: type=1400 audit(1707440938.176:685): avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.190256 kernel: audit: type=1400 audit(1707440938.176:685): avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.194059 kernel: audit: type=1400 audit(1707440938.176:685): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.194101 kernel: audit: type=1400 audit(1707440938.176:685): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.195969 kernel: audit: type=1400 audit(1707440938.176:685): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.200354 kernel: audit: type=1400 audit(1707440938.176:685): avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.176000 audit: BPF prog-id=87 op=LOAD Feb 9 01:08:58.176000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003829e0 items=0 ppid=1537 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632636664323762393031636137353831663864626339353533336131 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.179000 audit: BPF prog-id=88 op=LOAD Feb 9 01:08:58.179000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000382a28 items=0 ppid=1537 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632636664323762393031636137353831663864626339353533336131 Feb 9 01:08:58.182000 audit: BPF prog-id=88 op=UNLOAD Feb 9 01:08:58.182000 audit: BPF prog-id=87 op=UNLOAD Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.182000 audit: BPF prog-id=89 op=LOAD Feb 9 01:08:58.182000 audit[2099]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000382ab8 items=0 ppid=1537 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632636664323762393031636137353831663864626339353533336131 Feb 9 01:08:58.201671 env[1112]: time="2024-02-09T01:08:58.201610343Z" level=info msg="StartContainer for \"f2cfd27b901ca7581f8dbc95533a1e2892396060b7a03b56512177f57de3a973\" returns successfully" Feb 9 01:08:58.232454 kubelet[1418]: E0209 01:08:58.232417 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:58.259767 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 01:08:58.259905 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 01:08:58.409767 kubelet[1418]: E0209 01:08:58.409456 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:58.409767 kubelet[1418]: I0209 01:08:58.409629 1418 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" Feb 9 01:08:58.410025 env[1112]: time="2024-02-09T01:08:58.409980670Z" level=info msg="StopPodSandbox for \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\"" Feb 9 01:08:58.419389 kubelet[1418]: I0209 01:08:58.419177 1418 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-xsks4" podStartSLOduration=-9.22337198243563e+09 pod.CreationTimestamp="2024-02-09 01:08:04 +0000 UTC" firstStartedPulling="2024-02-09 01:08:08.58656086 +0000 UTC m=+17.762543245" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 01:08:58.419047183 +0000 UTC m=+67.595029568" watchObservedRunningTime="2024-02-09 01:08:58.419144917 +0000 UTC m=+67.595127302" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.444 [INFO][2181] k8s.go 578: Cleaning up netns ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.444 [INFO][2181] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" iface="eth0" netns="/var/run/netns/cni-c772d648-6344-a821-6fc8-85e6368deb3e" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.444 [INFO][2181] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" iface="eth0" netns="/var/run/netns/cni-c772d648-6344-a821-6fc8-85e6368deb3e" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.444 [INFO][2181] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" iface="eth0" netns="/var/run/netns/cni-c772d648-6344-a821-6fc8-85e6368deb3e" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.444 [INFO][2181] k8s.go 585: Releasing IP address(es) ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.444 [INFO][2181] utils.go 188: Calico CNI releasing IP address ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.459 [INFO][2203] ipam_plugin.go 415: Releasing address using handleID ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" HandleID="k8s-pod-network.8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.459 [INFO][2203] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.459 [INFO][2203] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.465 [WARNING][2203] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" HandleID="k8s-pod-network.8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.465 [INFO][2203] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" HandleID="k8s-pod-network.8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.467 [INFO][2203] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 01:08:58.470088 env[1112]: 2024-02-09 01:08:58.468 [INFO][2181] k8s.go 591: Teardown processing complete. ContainerID="8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2" Feb 9 01:08:58.470508 env[1112]: time="2024-02-09T01:08:58.470095198Z" level=info msg="TearDown network for sandbox \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\" successfully" Feb 9 01:08:58.470508 env[1112]: time="2024-02-09T01:08:58.470127158Z" level=info msg="StopPodSandbox for \"8de2f5ba37ef80c39f8cf07d84442ee6042c05da9e5eb35e95a4a0155cb8ddd2\" returns successfully" Feb 9 01:08:58.470788 env[1112]: time="2024-02-09T01:08:58.470743927Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-h4nqf,Uid:b7471f81-6255-4738-b8b4-fcefd2016644,Namespace:default,Attempt:1,}" Feb 9 01:08:58.559398 kernel: Initializing XFRM netlink socket Feb 9 01:08:58.563517 systemd-networkd[1012]: calib5d0a94a1d5: Link UP Feb 9 01:08:58.564383 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 01:08:58.564428 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib5d0a94a1d5: link becomes ready Feb 9 01:08:58.565172 systemd-networkd[1012]: calib5d0a94a1d5: Gained carrier Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.497 [INFO][2212] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.507 [INFO][2212] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0 nginx-deployment-8ffc5cf85- default b7471f81-6255-4738-b8b4-fcefd2016644 1032 0 2024-02-09 01:08:56 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.4 nginx-deployment-8ffc5cf85-h4nqf eth0 default [] [] [kns.default ksa.default.default] calib5d0a94a1d5 [] []}} ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-h4nqf" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.507 [INFO][2212] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-h4nqf" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.527 [INFO][2226] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" HandleID="k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.535 [INFO][2226] ipam_plugin.go 268: Auto assigning IP ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" HandleID="k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029fcd0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"nginx-deployment-8ffc5cf85-h4nqf", "timestamp":"2024-02-09 01:08:58.527439305 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.536 [INFO][2226] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.536 [INFO][2226] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.536 [INFO][2226] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.537 [INFO][2226] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.540 [INFO][2226] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.542 [INFO][2226] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.543 [INFO][2226] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.545 [INFO][2226] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.545 [INFO][2226] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.546 [INFO][2226] ipam.go 1682: Creating new handle: k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.548 [INFO][2226] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.551 [INFO][2226] ipam.go 1216: Successfully claimed IPs: [192.168.99.193/26] block=192.168.99.192/26 handle="k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.551 [INFO][2226] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.193/26] handle="k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" host="10.0.0.4" Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.551 [INFO][2226] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 01:08:58.570738 env[1112]: 2024-02-09 01:08:58.551 [INFO][2226] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.193/26] IPv6=[] ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" HandleID="k8s-pod-network.e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Workload="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.571291 env[1112]: 2024-02-09 01:08:58.553 [INFO][2212] k8s.go 385: Populated endpoint ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-h4nqf" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"b7471f81-6255-4738-b8b4-fcefd2016644", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 8, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-h4nqf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib5d0a94a1d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:08:58.571291 env[1112]: 2024-02-09 01:08:58.553 [INFO][2212] k8s.go 386: Calico CNI using IPs: [192.168.99.193/32] ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-h4nqf" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.571291 env[1112]: 2024-02-09 01:08:58.553 [INFO][2212] dataplane_linux.go 68: Setting the host side veth name to calib5d0a94a1d5 ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-h4nqf" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.571291 env[1112]: 2024-02-09 01:08:58.563 [INFO][2212] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-h4nqf" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.571291 env[1112]: 2024-02-09 01:08:58.565 [INFO][2212] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-h4nqf" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"b7471f81-6255-4738-b8b4-fcefd2016644", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 8, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c", Pod:"nginx-deployment-8ffc5cf85-h4nqf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib5d0a94a1d5", MAC:"82:0b:7e:f1:5f:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:08:58.571291 env[1112]: 2024-02-09 01:08:58.569 [INFO][2212] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c" Namespace="default" Pod="nginx-deployment-8ffc5cf85-h4nqf" WorkloadEndpoint="10.0.0.4-k8s-nginx--deployment--8ffc5cf85--h4nqf-eth0" Feb 9 01:08:58.580249 env[1112]: time="2024-02-09T01:08:58.580185199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 01:08:58.580249 env[1112]: time="2024-02-09T01:08:58.580227419Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 01:08:58.580249 env[1112]: time="2024-02-09T01:08:58.580238630Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 01:08:58.580456 env[1112]: time="2024-02-09T01:08:58.580420340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c pid=2255 runtime=io.containerd.runc.v2 Feb 9 01:08:58.590344 systemd[1]: Started cri-containerd-e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c.scope. Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit: BPF prog-id=90 op=LOAD Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2255 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363538393535303862626165623031366639306432383632666334 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2255 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363538393535303862626165623031366639306432383632666334 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit: BPF prog-id=91 op=LOAD Feb 9 01:08:58.597000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003209e0 items=0 ppid=2255 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363538393535303862626165623031366639306432383632666334 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.597000 audit: BPF prog-id=92 op=LOAD Feb 9 01:08:58.597000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000320a28 items=0 ppid=2255 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363538393535303862626165623031366639306432383632666334 Feb 9 01:08:58.598000 audit: BPF prog-id=92 op=UNLOAD Feb 9 01:08:58.598000 audit: BPF prog-id=91 op=UNLOAD Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { perfmon } for pid=2265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit[2265]: AVC avc: denied { bpf } for pid=2265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:58.598000 audit: BPF prog-id=93 op=LOAD Feb 9 01:08:58.598000 audit[2265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000320e38 items=0 ppid=2255 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:58.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363538393535303862626165623031366639306432383632666334 Feb 9 01:08:58.599977 systemd-resolved[1057]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 01:08:58.620681 env[1112]: time="2024-02-09T01:08:58.620640406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-h4nqf,Uid:b7471f81-6255-4738-b8b4-fcefd2016644,Namespace:default,Attempt:1,} returns sandbox id \"e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c\"" Feb 9 01:08:58.621869 env[1112]: time="2024-02-09T01:08:58.621847883Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 01:08:59.133091 systemd[1]: run-netns-cni\x2dc772d648\x2d6344\x2da821\x2d6fc8\x2d85e6368deb3e.mount: Deactivated successfully. Feb 9 01:08:59.233318 kubelet[1418]: E0209 01:08:59.233285 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:08:59.412797 kubelet[1418]: E0209 01:08:59.412559 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:08:59.420000 audit[2346]: AVC avc: denied { write } for pid=2346 comm="tee" name="fd" dev="proc" ino=19412 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 01:08:59.420000 audit[2346]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0a917991 a2=241 a3=1b6 items=1 ppid=2312 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.420000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 01:08:59.420000 audit: PATH item=0 name="/dev/fd/63" inode=19409 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:08:59.420000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 01:08:59.423000 audit[2348]: AVC avc: denied { write } for pid=2348 comm="tee" name="fd" dev="proc" ino=19963 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 01:08:59.423000 audit[2348]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf533b980 a2=241 a3=1b6 items=1 ppid=2299 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.423000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 01:08:59.423000 audit: PATH item=0 name="/dev/fd/63" inode=20668 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:08:59.423000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 01:08:59.423000 audit[2338]: AVC avc: denied { write } for pid=2338 comm="tee" name="fd" dev="proc" ino=20676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 01:08:59.423000 audit[2338]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc95a6f990 a2=241 a3=1b6 items=1 ppid=2297 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.423000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 01:08:59.423000 audit: PATH item=0 name="/dev/fd/63" inode=19406 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:08:59.423000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 01:08:59.430000 audit[2366]: AVC avc: denied { write } for pid=2366 comm="tee" name="fd" dev="proc" ino=19973 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 01:08:59.435291 systemd[1]: run-containerd-runc-k8s.io-f2cfd27b901ca7581f8dbc95533a1e2892396060b7a03b56512177f57de3a973-runc.0NlsbL.mount: Deactivated successfully. Feb 9 01:08:59.434000 audit[2363]: AVC avc: denied { write } for pid=2363 comm="tee" name="fd" dev="proc" ino=19976 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 01:08:59.430000 audit[2366]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3a59d990 a2=241 a3=1b6 items=1 ppid=2303 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.430000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 01:08:59.430000 audit: PATH item=0 name="/dev/fd/63" inode=19416 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:08:59.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 01:08:59.434000 audit[2363]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8ea16981 a2=241 a3=1b6 items=1 ppid=2305 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.434000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 01:08:59.434000 audit: PATH item=0 name="/dev/fd/63" inode=20673 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:08:59.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 01:08:59.450000 audit[2374]: AVC avc: denied { write } for pid=2374 comm="tee" name="fd" dev="proc" ino=21732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 01:08:59.450000 audit[2374]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc48055990 a2=241 a3=1b6 items=1 ppid=2306 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.450000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 01:08:59.450000 audit: PATH item=0 name="/dev/fd/63" inode=19419 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:08:59.450000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 01:08:59.474000 audit[2392]: AVC avc: denied { write } for pid=2392 comm="tee" name="fd" dev="proc" ino=19988 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 01:08:59.474000 audit[2392]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc40138992 a2=241 a3=1b6 items=1 ppid=2298 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.474000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 01:08:59.474000 audit: PATH item=0 name="/dev/fd/63" inode=19425 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:08:59.474000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit: BPF prog-id=94 op=LOAD Feb 9 01:08:59.589000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebd922270 a2=70 a3=7f9fb3715000 items=0 ppid=2311 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.589000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 01:08:59.589000 audit: BPF prog-id=94 op=UNLOAD Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.589000 audit: BPF prog-id=95 op=LOAD Feb 9 01:08:59.589000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebd922270 a2=70 a3=6e items=0 ppid=2311 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.589000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 01:08:59.590000 audit: BPF prog-id=95 op=UNLOAD Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffebd922220 a2=70 a3=7ffebd922270 items=0 ppid=2311 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.590000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit: BPF prog-id=96 op=LOAD Feb 9 01:08:59.590000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffebd922200 a2=70 a3=7ffebd922270 items=0 ppid=2311 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.590000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 01:08:59.590000 audit: BPF prog-id=96 op=UNLOAD Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebd9222e0 a2=70 a3=0 items=0 ppid=2311 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.590000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebd9222d0 a2=70 a3=0 items=0 ppid=2311 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.590000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffebd922310 a2=70 a3=0 items=0 ppid=2311 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.590000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.590000 audit: BPF prog-id=97 op=LOAD Feb 9 01:08:59.590000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffebd922230 a2=70 a3=ffffffff items=0 ppid=2311 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.590000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 01:08:59.593000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.593000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd85726910 a2=70 a3=208 items=0 ppid=2311 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 01:08:59.593000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:08:59.593000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd857267e0 a2=70 a3=3 items=0 ppid=2311 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 01:08:59.603000 audit: BPF prog-id=97 op=UNLOAD Feb 9 01:08:59.634000 audit[2491]: NETFILTER_CFG table=raw:79 family=2 entries=19 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:08:59.634000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffdfe8e40b0 a2=0 a3=7ffdfe8e409c items=0 ppid=2311 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.634000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:08:59.637000 audit[2492]: NETFILTER_CFG table=mangle:80 family=2 entries=19 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:08:59.637000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd28dc0750 a2=0 a3=7ffd28dc073c items=0 ppid=2311 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.637000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:08:59.641000 audit[2493]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:08:59.641000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe260676d0 a2=0 a3=7ffe260676bc items=0 ppid=2311 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.641000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:08:59.641000 audit[2495]: NETFILTER_CFG table=filter:82 family=2 entries=71 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:08:59.641000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=36604 a0=3 a1=7ffc3d888470 a2=0 a3=563061cde000 items=0 ppid=2311 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:08:59.641000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:08:59.658472 systemd-networkd[1012]: calib5d0a94a1d5: Gained IPv6LL Feb 9 01:09:00.233530 kubelet[1418]: E0209 01:09:00.233473 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:00.757929 systemd-networkd[1012]: vxlan.calico: Link UP Feb 9 01:09:00.757938 systemd-networkd[1012]: vxlan.calico: Gained carrier Feb 9 01:09:01.234520 kubelet[1418]: E0209 01:09:01.234480 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:01.949308 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1569443344.mount: Deactivated successfully. Feb 9 01:09:02.234709 kubelet[1418]: E0209 01:09:02.234597 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:02.477616 systemd-networkd[1012]: vxlan.calico: Gained IPv6LL Feb 9 01:09:03.234801 kubelet[1418]: E0209 01:09:03.234756 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:03.538153 env[1112]: time="2024-02-09T01:09:03.538077304Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:03.539627 env[1112]: time="2024-02-09T01:09:03.539601114Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:03.541075 env[1112]: time="2024-02-09T01:09:03.541032329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:03.542302 env[1112]: time="2024-02-09T01:09:03.542277677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:03.542814 env[1112]: time="2024-02-09T01:09:03.542792013Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 01:09:03.544189 env[1112]: time="2024-02-09T01:09:03.544161913Z" level=info msg="CreateContainer within sandbox \"e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 01:09:03.552924 env[1112]: time="2024-02-09T01:09:03.552889504Z" level=info msg="CreateContainer within sandbox \"e165895508bbaeb016f90d2862fc4eb0d7989851ec740fcbf255bdf04859d83c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"cb29875347971e4e4e528226058d8aafc58a4d50565c95dc638eae7f78e4d1b1\"" Feb 9 01:09:03.553245 env[1112]: time="2024-02-09T01:09:03.553215426Z" level=info msg="StartContainer for \"cb29875347971e4e4e528226058d8aafc58a4d50565c95dc638eae7f78e4d1b1\"" Feb 9 01:09:03.567375 systemd[1]: run-containerd-runc-k8s.io-cb29875347971e4e4e528226058d8aafc58a4d50565c95dc638eae7f78e4d1b1-runc.GiC4nB.mount: Deactivated successfully. Feb 9 01:09:03.568500 systemd[1]: Started cri-containerd-cb29875347971e4e4e528226058d8aafc58a4d50565c95dc638eae7f78e4d1b1.scope. Feb 9 01:09:03.586977 kernel: kauditd_printk_skb: 208 callbacks suppressed Feb 9 01:09:03.589174 kernel: audit: type=1400 audit(1707440943.576:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.589209 kernel: audit: type=1400 audit(1707440943.576:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.589228 kernel: audit: type=1400 audit(1707440943.576:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.589247 kernel: audit: type=1400 audit(1707440943.576:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.589265 kernel: audit: type=1400 audit(1707440943.576:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.589284 kernel: audit: type=1400 audit(1707440943.576:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.593515 kernel: audit: type=1400 audit(1707440943.576:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.599041 kernel: audit: type=1400 audit(1707440943.576:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.599128 kernel: audit: type=1400 audit(1707440943.576:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.599149 kernel: audit: type=1400 audit(1707440943.578:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.578000 audit: BPF prog-id=98 op=LOAD Feb 9 01:09:03.578000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.578000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2255 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:03.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323938373533343739373165346534653532383232363035386438 Feb 9 01:09:03.578000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.578000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2255 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:03.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323938373533343739373165346534653532383232363035386438 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.579000 audit: BPF prog-id=99 op=LOAD Feb 9 01:09:03.579000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001af900 items=0 ppid=2255 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:03.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323938373533343739373165346534653532383232363035386438 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit: BPF prog-id=100 op=LOAD Feb 9 01:09:03.580000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001af948 items=0 ppid=2255 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:03.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323938373533343739373165346534653532383232363035386438 Feb 9 01:09:03.580000 audit: BPF prog-id=100 op=UNLOAD Feb 9 01:09:03.580000 audit: BPF prog-id=99 op=UNLOAD Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:03.580000 audit: BPF prog-id=101 op=LOAD Feb 9 01:09:03.580000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001afd58 items=0 ppid=2255 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:03.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323938373533343739373165346534653532383232363035386438 Feb 9 01:09:03.706671 env[1112]: time="2024-02-09T01:09:03.706640843Z" level=info msg="StartContainer for \"cb29875347971e4e4e528226058d8aafc58a4d50565c95dc638eae7f78e4d1b1\" returns successfully" Feb 9 01:09:04.235607 kubelet[1418]: E0209 01:09:04.235586 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:04.425514 kubelet[1418]: I0209 01:09:04.425478 1418 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-h4nqf" podStartSLOduration=-9.22337202842934e+09 pod.CreationTimestamp="2024-02-09 01:08:56 +0000 UTC" firstStartedPulling="2024-02-09 01:08:58.621603173 +0000 UTC m=+67.797585558" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 01:09:04.424980009 +0000 UTC m=+73.600962394" watchObservedRunningTime="2024-02-09 01:09:04.425436105 +0000 UTC m=+73.601418480" Feb 9 01:09:05.236022 kubelet[1418]: E0209 01:09:05.235993 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:06.236688 kubelet[1418]: E0209 01:09:06.236665 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:07.236780 kubelet[1418]: E0209 01:09:07.236761 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:07.317015 env[1112]: time="2024-02-09T01:09:07.316967031Z" level=info msg="StopPodSandbox for \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\"" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.353 [INFO][2590] k8s.go 578: Cleaning up netns ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.353 [INFO][2590] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" iface="eth0" netns="/var/run/netns/cni-ac82541a-780a-d653-3a6c-66cc344b40f4" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.354 [INFO][2590] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" iface="eth0" netns="/var/run/netns/cni-ac82541a-780a-d653-3a6c-66cc344b40f4" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.354 [INFO][2590] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" iface="eth0" netns="/var/run/netns/cni-ac82541a-780a-d653-3a6c-66cc344b40f4" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.354 [INFO][2590] k8s.go 585: Releasing IP address(es) ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.354 [INFO][2590] utils.go 188: Calico CNI releasing IP address ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.368 [INFO][2598] ipam_plugin.go 415: Releasing address using handleID ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" HandleID="k8s-pod-network.4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Workload="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.368 [INFO][2598] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.368 [INFO][2598] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.374 [WARNING][2598] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" HandleID="k8s-pod-network.4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Workload="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.374 [INFO][2598] ipam_plugin.go 443: Releasing address using workloadID ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" HandleID="k8s-pod-network.4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Workload="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.376 [INFO][2598] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 01:09:07.377794 env[1112]: 2024-02-09 01:09:07.376 [INFO][2590] k8s.go 591: Teardown processing complete. ContainerID="4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7" Feb 9 01:09:07.378215 env[1112]: time="2024-02-09T01:09:07.378035472Z" level=info msg="TearDown network for sandbox \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\" successfully" Feb 9 01:09:07.378215 env[1112]: time="2024-02-09T01:09:07.378064106Z" level=info msg="StopPodSandbox for \"4e29316e75c98fb8372abf8e5ec83496efeecbc7cfa0832f534bbef256f5c0e7\" returns successfully" Feb 9 01:09:07.379232 systemd[1]: run-netns-cni\x2dac82541a\x2d780a\x2dd653\x2d3a6c\x2d66cc344b40f4.mount: Deactivated successfully. Feb 9 01:09:07.380091 env[1112]: time="2024-02-09T01:09:07.380069890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5rhlm,Uid:5d1dd464-a956-48ec-83e2-549250dfbace,Namespace:calico-system,Attempt:1,}" Feb 9 01:09:07.469751 systemd-networkd[1012]: cali5ce3e015aa5: Link UP Feb 9 01:09:07.470158 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 01:09:07.470188 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ce3e015aa5: link becomes ready Feb 9 01:09:07.470277 systemd-networkd[1012]: cali5ce3e015aa5: Gained carrier Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.416 [INFO][2605] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-csi--node--driver--5rhlm-eth0 csi-node-driver- calico-system 5d1dd464-a956-48ec-83e2-549250dfbace 1063 0 2024-02-09 01:08:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.4 csi-node-driver-5rhlm eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali5ce3e015aa5 [] []}} ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Namespace="calico-system" Pod="csi-node-driver-5rhlm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--5rhlm-" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.416 [INFO][2605] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Namespace="calico-system" Pod="csi-node-driver-5rhlm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.437 [INFO][2618] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" HandleID="k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Workload="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.445 [INFO][2618] ipam_plugin.go 268: Auto assigning IP ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" HandleID="k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Workload="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00061b6a0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.4", "pod":"csi-node-driver-5rhlm", "timestamp":"2024-02-09 01:09:07.437024962 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.445 [INFO][2618] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.445 [INFO][2618] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.445 [INFO][2618] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.446 [INFO][2618] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.449 [INFO][2618] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.452 [INFO][2618] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.453 [INFO][2618] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.455 [INFO][2618] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.455 [INFO][2618] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.456 [INFO][2618] ipam.go 1682: Creating new handle: k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7 Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.459 [INFO][2618] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.464 [INFO][2618] ipam.go 1216: Successfully claimed IPs: [192.168.99.194/26] block=192.168.99.192/26 handle="k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.464 [INFO][2618] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.194/26] handle="k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" host="10.0.0.4" Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.465 [INFO][2618] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 01:09:07.481324 env[1112]: 2024-02-09 01:09:07.465 [INFO][2618] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.194/26] IPv6=[] ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" HandleID="k8s-pod-network.aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Workload="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.481843 env[1112]: 2024-02-09 01:09:07.466 [INFO][2605] k8s.go 385: Populated endpoint ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Namespace="calico-system" Pod="csi-node-driver-5rhlm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-csi--node--driver--5rhlm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5d1dd464-a956-48ec-83e2-549250dfbace", ResourceVersion:"1063", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 8, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"csi-node-driver-5rhlm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5ce3e015aa5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:09:07.481843 env[1112]: 2024-02-09 01:09:07.466 [INFO][2605] k8s.go 386: Calico CNI using IPs: [192.168.99.194/32] ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Namespace="calico-system" Pod="csi-node-driver-5rhlm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.481843 env[1112]: 2024-02-09 01:09:07.466 [INFO][2605] dataplane_linux.go 68: Setting the host side veth name to cali5ce3e015aa5 ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Namespace="calico-system" Pod="csi-node-driver-5rhlm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.481843 env[1112]: 2024-02-09 01:09:07.470 [INFO][2605] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Namespace="calico-system" Pod="csi-node-driver-5rhlm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.481843 env[1112]: 2024-02-09 01:09:07.470 [INFO][2605] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Namespace="calico-system" Pod="csi-node-driver-5rhlm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-csi--node--driver--5rhlm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5d1dd464-a956-48ec-83e2-549250dfbace", ResourceVersion:"1063", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 8, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7", Pod:"csi-node-driver-5rhlm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali5ce3e015aa5", MAC:"72:8a:c4:d4:48:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:09:07.481843 env[1112]: 2024-02-09 01:09:07.475 [INFO][2605] k8s.go 491: Wrote updated endpoint to datastore ContainerID="aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7" Namespace="calico-system" Pod="csi-node-driver-5rhlm" WorkloadEndpoint="10.0.0.4-k8s-csi--node--driver--5rhlm-eth0" Feb 9 01:09:07.487000 audit[2645]: NETFILTER_CFG table=filter:83 family=2 entries=40 op=nft_register_chain pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:09:07.487000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffcc789ca20 a2=0 a3=7ffcc789ca0c items=0 ppid=2311 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:07.487000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:09:07.492460 env[1112]: time="2024-02-09T01:09:07.492392244Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 01:09:07.492460 env[1112]: time="2024-02-09T01:09:07.492429153Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 01:09:07.492460 env[1112]: time="2024-02-09T01:09:07.492439733Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 01:09:07.492737 env[1112]: time="2024-02-09T01:09:07.492695554Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7 pid=2651 runtime=io.containerd.runc.v2 Feb 9 01:09:07.503124 systemd[1]: Started cri-containerd-aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7.scope. Feb 9 01:09:07.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit: BPF prog-id=102 op=LOAD Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:07.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613036643832323739366161656265613330323737383932306661 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:07.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613036643832323739366161656265613330323737383932306661 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit: BPF prog-id=103 op=LOAD Feb 9 01:09:07.509000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000208350 items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:07.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613036643832323739366161656265613330323737383932306661 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.509000 audit: BPF prog-id=104 op=LOAD Feb 9 01:09:07.509000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000208398 items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:07.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613036643832323739366161656265613330323737383932306661 Feb 9 01:09:07.510000 audit: BPF prog-id=104 op=UNLOAD Feb 9 01:09:07.510000 audit: BPF prog-id=103 op=UNLOAD Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { perfmon } for pid=2661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit[2661]: AVC avc: denied { bpf } for pid=2661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:07.510000 audit: BPF prog-id=105 op=LOAD Feb 9 01:09:07.510000 audit[2661]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002087a8 items=0 ppid=2651 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:07.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162613036643832323739366161656265613330323737383932306661 Feb 9 01:09:07.511921 systemd-resolved[1057]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 01:09:07.521247 env[1112]: time="2024-02-09T01:09:07.521201644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5rhlm,Uid:5d1dd464-a956-48ec-83e2-549250dfbace,Namespace:calico-system,Attempt:1,} returns sandbox id \"aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7\"" Feb 9 01:09:07.522333 env[1112]: time="2024-02-09T01:09:07.522312197Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 01:09:08.237503 kubelet[1418]: E0209 01:09:08.237469 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:08.449000 audit[2710]: NETFILTER_CFG table=filter:84 family=2 entries=18 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:08.449000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fff2430f350 a2=0 a3=7fff2430f33c items=0 ppid=1768 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:08.451795 kubelet[1418]: I0209 01:09:08.451769 1418 topology_manager.go:210] "Topology Admit Handler" Feb 9 01:09:08.455783 systemd[1]: Created slice kubepods-besteffort-pod476f8d73_dcf9_4e56_ab5a_73c06b3f3cbc.slice. Feb 9 01:09:08.450000 audit[2710]: NETFILTER_CFG table=nat:85 family=2 entries=78 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:08.450000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff2430f350 a2=0 a3=7fff2430f33c items=0 ppid=1768 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:08.483000 audit[2737]: NETFILTER_CFG table=filter:86 family=2 entries=30 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:08.483000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd342b9b30 a2=0 a3=7ffd342b9b1c items=0 ppid=1768 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:08.484000 audit[2737]: NETFILTER_CFG table=nat:87 family=2 entries=78 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:08.484000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd342b9b30 a2=0 a3=7ffd342b9b1c items=0 ppid=1768 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:08.535567 kubelet[1418]: I0209 01:09:08.535534 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qp88v\" (UniqueName: \"kubernetes.io/projected/476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc-kube-api-access-qp88v\") pod \"nfs-server-provisioner-0\" (UID: \"476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc\") " pod="default/nfs-server-provisioner-0" Feb 9 01:09:08.535655 kubelet[1418]: I0209 01:09:08.535571 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc-data\") pod \"nfs-server-provisioner-0\" (UID: \"476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc\") " pod="default/nfs-server-provisioner-0" Feb 9 01:09:08.757731 env[1112]: time="2024-02-09T01:09:08.757644264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc,Namespace:default,Attempt:0,}" Feb 9 01:09:08.844373 systemd-networkd[1012]: cali60e51b789ff: Link UP Feb 9 01:09:08.846559 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 01:09:08.846681 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 01:09:08.846702 systemd-networkd[1012]: cali60e51b789ff: Gained carrier Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.793 [INFO][2740] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc 1084 0 2024-02-09 01:09:08 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.4 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.793 [INFO][2740] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.813 [INFO][2754] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" HandleID="k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.824 [INFO][2754] ipam_plugin.go 268: Auto assigning IP ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" HandleID="k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025d910), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 01:09:08.813737164 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.824 [INFO][2754] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.824 [INFO][2754] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.824 [INFO][2754] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.825 [INFO][2754] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.828 [INFO][2754] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.831 [INFO][2754] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.832 [INFO][2754] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.833 [INFO][2754] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.833 [INFO][2754] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.834 [INFO][2754] ipam.go 1682: Creating new handle: k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222 Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.837 [INFO][2754] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.840 [INFO][2754] ipam.go 1216: Successfully claimed IPs: [192.168.99.195/26] block=192.168.99.192/26 handle="k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.841 [INFO][2754] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.195/26] handle="k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" host="10.0.0.4" Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.841 [INFO][2754] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 01:09:08.853935 env[1112]: 2024-02-09 01:09:08.841 [INFO][2754] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.195/26] IPv6=[] ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" HandleID="k8s-pod-network.837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Workload="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 01:09:08.854600 env[1112]: 2024-02-09 01:09:08.842 [INFO][2740] k8s.go 385: Populated endpoint ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 9, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:09:08.854600 env[1112]: 2024-02-09 01:09:08.842 [INFO][2740] k8s.go 386: Calico CNI using IPs: [192.168.99.195/32] ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 01:09:08.854600 env[1112]: 2024-02-09 01:09:08.842 [INFO][2740] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 01:09:08.854600 env[1112]: 2024-02-09 01:09:08.847 [INFO][2740] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 01:09:08.854750 env[1112]: 2024-02-09 01:09:08.847 [INFO][2740] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 9, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.99.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"86:c0:e9:47:85:bc", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:09:08.854750 env[1112]: 2024-02-09 01:09:08.851 [INFO][2740] k8s.go 491: Wrote updated endpoint to datastore ContainerID="837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.4-k8s-nfs--server--provisioner--0-eth0" Feb 9 01:09:08.865000 audit[2781]: NETFILTER_CFG table=filter:88 family=2 entries=38 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:09:08.867488 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 9 01:09:08.867536 kernel: audit: type=1325 audit(1707440948.865:774): table=filter:88 family=2 entries=38 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:09:08.865000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffd9846ac40 a2=0 a3=7ffd9846ac2c items=0 ppid=2311 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.870701 env[1112]: time="2024-02-09T01:09:08.870646034Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 01:09:08.870701 env[1112]: time="2024-02-09T01:09:08.870702450Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 01:09:08.871105 env[1112]: time="2024-02-09T01:09:08.870728909Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 01:09:08.871105 env[1112]: time="2024-02-09T01:09:08.870906572Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222 pid=2789 runtime=io.containerd.runc.v2 Feb 9 01:09:08.872462 kernel: audit: type=1300 audit(1707440948.865:774): arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffd9846ac40 a2=0 a3=7ffd9846ac2c items=0 ppid=2311 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.872561 kernel: audit: type=1327 audit(1707440948.865:774): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:09:08.865000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:09:08.883201 systemd[1]: Started cri-containerd-837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222.scope. Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896321 kernel: audit: type=1400 audit(1707440948.890:775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896394 kernel: audit: type=1400 audit(1707440948.890:776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896417 kernel: audit: type=1400 audit(1707440948.890:777): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.900380 kernel: audit: type=1400 audit(1707440948.890:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.900425 kernel: audit: type=1400 audit(1707440948.890:779): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.902176 kernel: audit: type=1400 audit(1707440948.890:780): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.905423 systemd-resolved[1057]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 01:09:08.906047 kernel: audit: type=1400 audit(1707440948.890:781): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.894000 audit: BPF prog-id=106 op=LOAD Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2789 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833376462363538663163653036663131356664353939313331343562 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2789 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833376462363538663163653036663131356664353939313331343562 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.895000 audit: BPF prog-id=107 op=LOAD Feb 9 01:09:08.895000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000388340 items=0 ppid=2789 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833376462363538663163653036663131356664353939313331343562 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.896000 audit: BPF prog-id=108 op=LOAD Feb 9 01:09:08.896000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000388388 items=0 ppid=2789 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833376462363538663163653036663131356664353939313331343562 Feb 9 01:09:08.898000 audit: BPF prog-id=108 op=UNLOAD Feb 9 01:09:08.898000 audit: BPF prog-id=107 op=UNLOAD Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:08.898000 audit: BPF prog-id=109 op=LOAD Feb 9 01:09:08.898000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000388798 items=0 ppid=2789 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:08.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833376462363538663163653036663131356664353939313331343562 Feb 9 01:09:08.927243 env[1112]: time="2024-02-09T01:09:08.927204467Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:476f8d73-dcf9-4e56-ab5a-73c06b3f3cbc,Namespace:default,Attempt:0,} returns sandbox id \"837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222\"" Feb 9 01:09:09.194513 systemd-networkd[1012]: cali5ce3e015aa5: Gained IPv6LL Feb 9 01:09:09.238460 kubelet[1418]: E0209 01:09:09.238428 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:09.426057 env[1112]: time="2024-02-09T01:09:09.426016593Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:09.427585 env[1112]: time="2024-02-09T01:09:09.427553928Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:09.429145 env[1112]: time="2024-02-09T01:09:09.429098085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:09.430696 env[1112]: time="2024-02-09T01:09:09.430654876Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:09.431465 env[1112]: time="2024-02-09T01:09:09.431434158Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 01:09:09.433538 env[1112]: time="2024-02-09T01:09:09.433053847Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 01:09:09.433743 env[1112]: time="2024-02-09T01:09:09.433690280Z" level=info msg="CreateContainer within sandbox \"aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 01:09:09.445166 env[1112]: time="2024-02-09T01:09:09.445077036Z" level=info msg="CreateContainer within sandbox \"aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"b997ffd6ead7c7f231bf17d4cbf1f742851bba103fa01955b7df83423bfc2a77\"" Feb 9 01:09:09.445386 env[1112]: time="2024-02-09T01:09:09.445351150Z" level=info msg="StartContainer for \"b997ffd6ead7c7f231bf17d4cbf1f742851bba103fa01955b7df83423bfc2a77\"" Feb 9 01:09:09.464584 systemd[1]: Started cri-containerd-b997ffd6ead7c7f231bf17d4cbf1f742851bba103fa01955b7df83423bfc2a77.scope. Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2651 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:09.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393766666436656164376337663233316266313764346362663166 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit: BPF prog-id=110 op=LOAD Feb 9 01:09:09.473000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002d9be0 items=0 ppid=2651 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:09.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393766666436656164376337663233316266313764346362663166 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit: BPF prog-id=111 op=LOAD Feb 9 01:09:09.473000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002d9c28 items=0 ppid=2651 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:09.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393766666436656164376337663233316266313764346362663166 Feb 9 01:09:09.473000 audit: BPF prog-id=111 op=UNLOAD Feb 9 01:09:09.473000 audit: BPF prog-id=110 op=UNLOAD Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { perfmon } for pid=2828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit[2828]: AVC avc: denied { bpf } for pid=2828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:09.473000 audit: BPF prog-id=112 op=LOAD Feb 9 01:09:09.473000 audit[2828]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002d9cb8 items=0 ppid=2651 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:09.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393766666436656164376337663233316266313764346362663166 Feb 9 01:09:09.542356 env[1112]: time="2024-02-09T01:09:09.542312514Z" level=info msg="StartContainer for \"b997ffd6ead7c7f231bf17d4cbf1f742851bba103fa01955b7df83423bfc2a77\" returns successfully" Feb 9 01:09:10.239552 kubelet[1418]: E0209 01:09:10.239498 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:10.379588 systemd[1]: run-containerd-runc-k8s.io-b997ffd6ead7c7f231bf17d4cbf1f742851bba103fa01955b7df83423bfc2a77-runc.uYWN9Q.mount: Deactivated successfully. Feb 9 01:09:10.538491 systemd-networkd[1012]: cali60e51b789ff: Gained IPv6LL Feb 9 01:09:11.193761 kubelet[1418]: E0209 01:09:11.193718 1418 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:11.239953 kubelet[1418]: E0209 01:09:11.239918 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:11.996709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1388494056.mount: Deactivated successfully. Feb 9 01:09:12.240993 kubelet[1418]: E0209 01:09:12.240944 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:13.241777 kubelet[1418]: E0209 01:09:13.241731 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:14.241837 kubelet[1418]: E0209 01:09:14.241806 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:14.399057 env[1112]: time="2024-02-09T01:09:14.399015761Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:14.400578 env[1112]: time="2024-02-09T01:09:14.400541463Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:14.404376 env[1112]: time="2024-02-09T01:09:14.404322376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:14.405146 env[1112]: time="2024-02-09T01:09:14.405101517Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:14.405819 env[1112]: time="2024-02-09T01:09:14.405788156Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 01:09:14.406590 env[1112]: time="2024-02-09T01:09:14.406564482Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 01:09:14.407208 env[1112]: time="2024-02-09T01:09:14.407180277Z" level=info msg="CreateContainer within sandbox \"837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 01:09:14.416998 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1914062916.mount: Deactivated successfully. Feb 9 01:09:14.418876 env[1112]: time="2024-02-09T01:09:14.418844418Z" level=info msg="CreateContainer within sandbox \"837db658f1ce06f115fd59913145bf9728bce164faf4d97f7a6b5f36dec19222\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"bf5940e31862a95a3f180f6bc7759850f80ea6b4748fe1ac70cad3ffaf43769b\"" Feb 9 01:09:14.419240 env[1112]: time="2024-02-09T01:09:14.419215694Z" level=info msg="StartContainer for \"bf5940e31862a95a3f180f6bc7759850f80ea6b4748fe1ac70cad3ffaf43769b\"" Feb 9 01:09:14.433168 systemd[1]: Started cri-containerd-bf5940e31862a95a3f180f6bc7759850f80ea6b4748fe1ac70cad3ffaf43769b.scope. Feb 9 01:09:14.451388 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 9 01:09:14.451510 kernel: audit: type=1400 audit(1707440954.442:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.451534 kernel: audit: type=1400 audit(1707440954.442:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.451550 kernel: audit: type=1400 audit(1707440954.442:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.455202 kernel: audit: type=1400 audit(1707440954.443:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.455234 kernel: audit: type=1400 audit(1707440954.443:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.460556 kernel: audit: type=1400 audit(1707440954.443:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.460622 kernel: audit: type=1400 audit(1707440954.443:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.465381 kernel: audit: type=1400 audit(1707440954.443:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.465437 kernel: audit: type=1400 audit(1707440954.443:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.472763 kernel: audit: type=1400 audit(1707440954.443:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.443000 audit: BPF prog-id=113 op=LOAD Feb 9 01:09:14.445000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.445000 audit[2873]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2789 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:14.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353934306533313836326139356133663138306636626337373539 Feb 9 01:09:14.445000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.445000 audit[2873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2789 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:14.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353934306533313836326139356133663138306636626337373539 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit: BPF prog-id=114 op=LOAD Feb 9 01:09:14.446000 audit[2873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018b5b0 items=0 ppid=2789 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:14.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353934306533313836326139356133663138306636626337373539 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.446000 audit: BPF prog-id=115 op=LOAD Feb 9 01:09:14.446000 audit[2873]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018b5f8 items=0 ppid=2789 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:14.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353934306533313836326139356133663138306636626337373539 Feb 9 01:09:14.456000 audit: BPF prog-id=115 op=UNLOAD Feb 9 01:09:14.456000 audit: BPF prog-id=114 op=UNLOAD Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { perfmon } for pid=2873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit[2873]: AVC avc: denied { bpf } for pid=2873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:14.456000 audit: BPF prog-id=116 op=LOAD Feb 9 01:09:14.456000 audit[2873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00018ba08 items=0 ppid=2789 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:14.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266353934306533313836326139356133663138306636626337373539 Feb 9 01:09:14.521000 audit[2901]: AVC avc: denied { search } for pid=2901 comm="rpcbind" name="crypto" dev="proc" ino=23040 scontext=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 01:09:14.521000 audit[2901]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f182738b0c0 a2=0 a3=0 items=0 ppid=2883 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 key=(null) Feb 9 01:09:14.521000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 01:09:14.905326 env[1112]: time="2024-02-09T01:09:14.905247927Z" level=info msg="StartContainer for \"bf5940e31862a95a3f180f6bc7759850f80ea6b4748fe1ac70cad3ffaf43769b\" returns successfully" Feb 9 01:09:14.908000 audit[2906]: AVC avc: denied { search } for pid=2906 comm="dbus-daemon" name="crypto" dev="proc" ino=23040 scontext=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 01:09:14.908000 audit[2906]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f42cd0d50c0 a2=0 a3=0 items=0 ppid=2883 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 key=(null) Feb 9 01:09:14.908000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 01:09:14.910000 audit[2907]: AVC avc: denied { watch } for pid=2907 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c147,c385 tclass=dir permissive=0 Feb 9 01:09:14.910000 audit[2907]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55b20f3bd970 a2=2c8 a3=7ffca3ad90ac items=0 ppid=2883 pid=2907 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 key=(null) Feb 9 01:09:14.910000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 01:09:14.912000 audit[2908]: AVC avc: denied { read } for pid=2908 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22476 scontext=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 01:09:14.912000 audit[2908]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f579f27b320 a1=80000 a2=d a3=7ffe677fa380 items=0 ppid=2883 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 key=(null) Feb 9 01:09:14.912000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 01:09:14.913000 audit[2908]: AVC avc: denied { search } for pid=2908 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23040 scontext=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 01:09:14.913000 audit[2908]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f579e7cf0c0 a2=0 a3=0 items=0 ppid=2883 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c147,c385 key=(null) Feb 9 01:09:14.913000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 01:09:15.242585 kubelet[1418]: E0209 01:09:15.242560 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:15.455771 kubelet[1418]: I0209 01:09:15.455750 1418 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372029399054e+09 pod.CreationTimestamp="2024-02-09 01:09:08 +0000 UTC" firstStartedPulling="2024-02-09 01:09:08.928141605 +0000 UTC m=+78.104123990" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 01:09:15.455268323 +0000 UTC m=+84.631250708" watchObservedRunningTime="2024-02-09 01:09:15.455721497 +0000 UTC m=+84.631703882" Feb 9 01:09:15.482000 audit[2948]: NETFILTER_CFG table=filter:89 family=2 entries=18 op=nft_register_rule pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:15.482000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd20531db0 a2=0 a3=7ffd20531d9c items=0 ppid=1768 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:15.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:15.485000 audit[2948]: NETFILTER_CFG table=nat:90 family=2 entries=162 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:15.485000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffd20531db0 a2=0 a3=7ffd20531d9c items=0 ppid=1768 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:15.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:16.115136 env[1112]: time="2024-02-09T01:09:16.114835607Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:16.116007 env[1112]: time="2024-02-09T01:09:16.115958192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:16.117220 env[1112]: time="2024-02-09T01:09:16.117177153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:16.118471 env[1112]: time="2024-02-09T01:09:16.118431924Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:16.118856 env[1112]: time="2024-02-09T01:09:16.118827200Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 01:09:16.120328 env[1112]: time="2024-02-09T01:09:16.120300234Z" level=info msg="CreateContainer within sandbox \"aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 01:09:16.132834 env[1112]: time="2024-02-09T01:09:16.132797775Z" level=info msg="CreateContainer within sandbox \"aba06d822796aaebea302778920fa44c9536ec30dee8ea78a3cfb447ad1868b7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"783f875db629873c23933b97893aa617a897836d9b96450ca6a3a24a39be8353\"" Feb 9 01:09:16.133252 env[1112]: time="2024-02-09T01:09:16.133230233Z" level=info msg="StartContainer for \"783f875db629873c23933b97893aa617a897836d9b96450ca6a3a24a39be8353\"" Feb 9 01:09:16.149081 systemd[1]: Started cri-containerd-783f875db629873c23933b97893aa617a897836d9b96450ca6a3a24a39be8353.scope. Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2651 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336638373564623632393837336332333933336239373839336161 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit: BPF prog-id=117 op=LOAD Feb 9 01:09:16.164000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000267eb0 items=0 ppid=2651 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336638373564623632393837336332333933336239373839336161 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit: BPF prog-id=118 op=LOAD Feb 9 01:09:16.164000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000267ef8 items=0 ppid=2651 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336638373564623632393837336332333933336239373839336161 Feb 9 01:09:16.164000 audit: BPF prog-id=118 op=UNLOAD Feb 9 01:09:16.164000 audit: BPF prog-id=117 op=UNLOAD Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:16.164000 audit: BPF prog-id=119 op=LOAD Feb 9 01:09:16.164000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000267f88 items=0 ppid=2651 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738336638373564623632393837336332333933336239373839336161 Feb 9 01:09:16.236474 env[1112]: time="2024-02-09T01:09:16.236419963Z" level=info msg="StartContainer for \"783f875db629873c23933b97893aa617a897836d9b96450ca6a3a24a39be8353\" returns successfully" Feb 9 01:09:16.242869 kubelet[1418]: E0209 01:09:16.242848 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:16.286605 kubelet[1418]: I0209 01:09:16.286576 1418 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 01:09:16.286741 kubelet[1418]: I0209 01:09:16.286724 1418 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 01:09:16.464898 kubelet[1418]: I0209 01:09:16.464863 1418 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5rhlm" podStartSLOduration=-9.22337196438994e+09 pod.CreationTimestamp="2024-02-09 01:08:04 +0000 UTC" firstStartedPulling="2024-02-09 01:09:07.5220683 +0000 UTC m=+76.698050685" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 01:09:16.464660853 +0000 UTC m=+85.640643238" watchObservedRunningTime="2024-02-09 01:09:16.464835321 +0000 UTC m=+85.640817706" Feb 9 01:09:17.004985 kubelet[1418]: E0209 01:09:17.004958 1418 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 01:09:17.243464 kubelet[1418]: E0209 01:09:17.243443 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:18.244181 kubelet[1418]: E0209 01:09:18.244156 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:19.244576 kubelet[1418]: E0209 01:09:19.244536 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:19.293458 kubelet[1418]: I0209 01:09:19.293438 1418 topology_manager.go:210] "Topology Admit Handler" Feb 9 01:09:19.298237 systemd[1]: Created slice kubepods-besteffort-podb3f3e6a1_e772_415f_aa4d_9e977e38c91f.slice. Feb 9 01:09:19.308000 audit[3039]: NETFILTER_CFG table=filter:91 family=2 entries=7 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:19.308000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd4735dcf0 a2=0 a3=7ffd4735dcdc items=0 ppid=1768 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:19.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:19.311000 audit[3039]: NETFILTER_CFG table=nat:92 family=2 entries=198 op=nft_register_rule pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:19.311000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffd4735dcf0 a2=0 a3=7ffd4735dcdc items=0 ppid=1768 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:19.311000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:19.340000 audit[3065]: NETFILTER_CFG table=filter:93 family=2 entries=8 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:19.340000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe36ea5ac0 a2=0 a3=7ffe36ea5aac items=0 ppid=1768 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:19.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:19.343000 audit[3065]: NETFILTER_CFG table=nat:94 family=2 entries=198 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:19.343000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffe36ea5ac0 a2=0 a3=7ffe36ea5aac items=0 ppid=1768 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:19.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:19.381633 kubelet[1418]: I0209 01:09:19.381612 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b3f3e6a1-e772-415f-aa4d-9e977e38c91f-calico-apiserver-certs\") pod \"calico-apiserver-6554b95969-6gcms\" (UID: \"b3f3e6a1-e772-415f-aa4d-9e977e38c91f\") " pod="calico-apiserver/calico-apiserver-6554b95969-6gcms" Feb 9 01:09:19.381710 kubelet[1418]: I0209 01:09:19.381647 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t4zkx\" (UniqueName: \"kubernetes.io/projected/b3f3e6a1-e772-415f-aa4d-9e977e38c91f-kube-api-access-t4zkx\") pod \"calico-apiserver-6554b95969-6gcms\" (UID: \"b3f3e6a1-e772-415f-aa4d-9e977e38c91f\") " pod="calico-apiserver/calico-apiserver-6554b95969-6gcms" Feb 9 01:09:19.482070 kubelet[1418]: E0209 01:09:19.482048 1418 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 01:09:19.482185 kubelet[1418]: E0209 01:09:19.482172 1418 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b3f3e6a1-e772-415f-aa4d-9e977e38c91f-calico-apiserver-certs podName:b3f3e6a1-e772-415f-aa4d-9e977e38c91f nodeName:}" failed. No retries permitted until 2024-02-09 01:09:19.982110934 +0000 UTC m=+89.158093319 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b3f3e6a1-e772-415f-aa4d-9e977e38c91f-calico-apiserver-certs") pod "calico-apiserver-6554b95969-6gcms" (UID: "b3f3e6a1-e772-415f-aa4d-9e977e38c91f") : secret "calico-apiserver-certs" not found Feb 9 01:09:20.201119 env[1112]: time="2024-02-09T01:09:20.201074181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6554b95969-6gcms,Uid:b3f3e6a1-e772-415f-aa4d-9e977e38c91f,Namespace:calico-apiserver,Attempt:0,}" Feb 9 01:09:20.245375 kubelet[1418]: E0209 01:09:20.245322 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:20.286636 systemd-networkd[1012]: cali0bd48e60c20: Link UP Feb 9 01:09:20.288291 systemd-networkd[1012]: cali0bd48e60c20: Gained carrier Feb 9 01:09:20.288490 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 01:09:20.288533 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0bd48e60c20: link becomes ready Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.238 [INFO][3078] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0 calico-apiserver-6554b95969- calico-apiserver b3f3e6a1-e772-415f-aa4d-9e977e38c91f 1176 0 2024-02-09 01:09:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6554b95969 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.4 calico-apiserver-6554b95969-6gcms eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0bd48e60c20 [] []}} ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Namespace="calico-apiserver" Pod="calico-apiserver-6554b95969-6gcms" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.238 [INFO][3078] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Namespace="calico-apiserver" Pod="calico-apiserver-6554b95969-6gcms" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.258 [INFO][3091] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" HandleID="k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Workload="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.266 [INFO][3091] ipam_plugin.go 268: Auto assigning IP ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" HandleID="k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Workload="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050230), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.4", "pod":"calico-apiserver-6554b95969-6gcms", "timestamp":"2024-02-09 01:09:20.258340184 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.266 [INFO][3091] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.266 [INFO][3091] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.266 [INFO][3091] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.267 [INFO][3091] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.270 [INFO][3091] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.273 [INFO][3091] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.274 [INFO][3091] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.276 [INFO][3091] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.276 [INFO][3091] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.277 [INFO][3091] ipam.go 1682: Creating new handle: k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54 Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.280 [INFO][3091] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.283 [INFO][3091] ipam.go 1216: Successfully claimed IPs: [192.168.99.196/26] block=192.168.99.192/26 handle="k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.283 [INFO][3091] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.196/26] handle="k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" host="10.0.0.4" Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.283 [INFO][3091] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 01:09:20.299063 env[1112]: 2024-02-09 01:09:20.283 [INFO][3091] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.196/26] IPv6=[] ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" HandleID="k8s-pod-network.a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Workload="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" Feb 9 01:09:20.299625 env[1112]: 2024-02-09 01:09:20.284 [INFO][3078] k8s.go 385: Populated endpoint ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Namespace="calico-apiserver" Pod="calico-apiserver-6554b95969-6gcms" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0", GenerateName:"calico-apiserver-6554b95969-", Namespace:"calico-apiserver", SelfLink:"", UID:"b3f3e6a1-e772-415f-aa4d-9e977e38c91f", ResourceVersion:"1176", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 9, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6554b95969", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"calico-apiserver-6554b95969-6gcms", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0bd48e60c20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:09:20.299625 env[1112]: 2024-02-09 01:09:20.285 [INFO][3078] k8s.go 386: Calico CNI using IPs: [192.168.99.196/32] ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Namespace="calico-apiserver" Pod="calico-apiserver-6554b95969-6gcms" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" Feb 9 01:09:20.299625 env[1112]: 2024-02-09 01:09:20.285 [INFO][3078] dataplane_linux.go 68: Setting the host side veth name to cali0bd48e60c20 ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Namespace="calico-apiserver" Pod="calico-apiserver-6554b95969-6gcms" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" Feb 9 01:09:20.299625 env[1112]: 2024-02-09 01:09:20.288 [INFO][3078] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Namespace="calico-apiserver" Pod="calico-apiserver-6554b95969-6gcms" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" Feb 9 01:09:20.299625 env[1112]: 2024-02-09 01:09:20.289 [INFO][3078] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Namespace="calico-apiserver" Pod="calico-apiserver-6554b95969-6gcms" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0", GenerateName:"calico-apiserver-6554b95969-", Namespace:"calico-apiserver", SelfLink:"", UID:"b3f3e6a1-e772-415f-aa4d-9e977e38c91f", ResourceVersion:"1176", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 9, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6554b95969", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54", Pod:"calico-apiserver-6554b95969-6gcms", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0bd48e60c20", MAC:"ea:56:07:b1:ca:2d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:09:20.299625 env[1112]: 2024-02-09 01:09:20.294 [INFO][3078] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54" Namespace="calico-apiserver" Pod="calico-apiserver-6554b95969-6gcms" WorkloadEndpoint="10.0.0.4-k8s-calico--apiserver--6554b95969--6gcms-eth0" Feb 9 01:09:20.315901 kernel: kauditd_printk_skb: 123 callbacks suppressed Feb 9 01:09:20.316021 kernel: audit: type=1325 audit(1707440960.308:834): table=filter:95 family=2 entries=55 op=nft_register_chain pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:09:20.316046 kernel: audit: type=1300 audit(1707440960.308:834): arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffe89192930 a2=0 a3=7ffe8919291c items=0 ppid=2311 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:20.316063 kernel: audit: type=1327 audit(1707440960.308:834): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:09:20.308000 audit[3124]: NETFILTER_CFG table=filter:95 family=2 entries=55 op=nft_register_chain pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:09:20.308000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffe89192930 a2=0 a3=7ffe8919291c items=0 ppid=2311 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:20.308000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:09:20.316300 env[1112]: time="2024-02-09T01:09:20.310753378Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 01:09:20.316300 env[1112]: time="2024-02-09T01:09:20.310786611Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 01:09:20.316300 env[1112]: time="2024-02-09T01:09:20.310796250Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 01:09:20.316300 env[1112]: time="2024-02-09T01:09:20.310941781Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54 pid=3127 runtime=io.containerd.runc.v2 Feb 9 01:09:20.327207 systemd[1]: Started cri-containerd-a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54.scope. Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.339956 kernel: audit: type=1400 audit(1707440960.334:835): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.339993 kernel: audit: type=1400 audit(1707440960.334:836): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340011 kernel: audit: type=1400 audit(1707440960.334:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.343847 kernel: audit: type=1400 audit(1707440960.334:838): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.343904 kernel: audit: type=1400 audit(1707440960.334:839): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.347820 kernel: audit: type=1400 audit(1707440960.334:840): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.347862 kernel: audit: type=1400 audit(1707440960.334:841): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.347972 systemd-resolved[1057]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit: BPF prog-id=120 op=LOAD Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3127 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:20.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353232623236663338343935373337623566353039373761643037 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3127 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:20.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353232623236663338343935373337623566353039373761643037 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.338000 audit: BPF prog-id=121 op=LOAD Feb 9 01:09:20.338000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003249d0 items=0 ppid=3127 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:20.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353232623236663338343935373337623566353039373761643037 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.340000 audit: BPF prog-id=122 op=LOAD Feb 9 01:09:20.340000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000324a18 items=0 ppid=3127 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:20.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353232623236663338343935373337623566353039373761643037 Feb 9 01:09:20.342000 audit: BPF prog-id=122 op=UNLOAD Feb 9 01:09:20.342000 audit: BPF prog-id=121 op=UNLOAD Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:20.342000 audit: BPF prog-id=123 op=LOAD Feb 9 01:09:20.342000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000324e28 items=0 ppid=3127 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:20.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135353232623236663338343935373337623566353039373761643037 Feb 9 01:09:20.369130 env[1112]: time="2024-02-09T01:09:20.369086121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6554b95969-6gcms,Uid:b3f3e6a1-e772-415f-aa4d-9e977e38c91f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54\"" Feb 9 01:09:20.370223 env[1112]: time="2024-02-09T01:09:20.370202977Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 01:09:20.743322 kubelet[1418]: I0209 01:09:20.743294 1418 topology_manager.go:210] "Topology Admit Handler" Feb 9 01:09:20.747704 systemd[1]: Created slice kubepods-besteffort-pod2978a88f_d245_4bc4_9352_50ced7c73983.slice. Feb 9 01:09:20.889992 kubelet[1418]: I0209 01:09:20.889958 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-76818499-1aab-4f63-8f83-1bf0c55a6b64\" (UniqueName: \"kubernetes.io/nfs/2978a88f-d245-4bc4-9352-50ced7c73983-pvc-76818499-1aab-4f63-8f83-1bf0c55a6b64\") pod \"test-pod-1\" (UID: \"2978a88f-d245-4bc4-9352-50ced7c73983\") " pod="default/test-pod-1" Feb 9 01:09:20.890051 kubelet[1418]: I0209 01:09:20.890003 1418 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r9ppx\" (UniqueName: \"kubernetes.io/projected/2978a88f-d245-4bc4-9352-50ced7c73983-kube-api-access-r9ppx\") pod \"test-pod-1\" (UID: \"2978a88f-d245-4bc4-9352-50ced7c73983\") " pod="default/test-pod-1" Feb 9 01:09:20.998000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.001420 kernel: Failed to create system directory netfs Feb 9 01:09:21.001505 kernel: Failed to create system directory netfs Feb 9 01:09:21.001520 kernel: Failed to create system directory netfs Feb 9 01:09:20.998000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:20.998000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:20.998000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.002383 kernel: Failed to create system directory netfs Feb 9 01:09:20.998000 audit[3164]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561ab5c3e5e0 a1=153bc a2=561ab55f42b0 a3=5 items=0 ppid=627 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:20.998000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.010723 kernel: Failed to create system directory fscache Feb 9 01:09:21.010752 kernel: Failed to create system directory fscache Feb 9 01:09:21.010772 kernel: Failed to create system directory fscache Feb 9 01:09:21.010785 kernel: Failed to create system directory fscache Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.011717 kernel: Failed to create system directory fscache Feb 9 01:09:21.011739 kernel: Failed to create system directory fscache Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.012716 kernel: Failed to create system directory fscache Feb 9 01:09:21.012736 kernel: Failed to create system directory fscache Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.013728 kernel: Failed to create system directory fscache Feb 9 01:09:21.013764 kernel: Failed to create system directory fscache Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.014701 kernel: Failed to create system directory fscache Feb 9 01:09:21.014725 kernel: Failed to create system directory fscache Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.015695 kernel: Failed to create system directory fscache Feb 9 01:09:21.015717 kernel: Failed to create system directory fscache Feb 9 01:09:21.006000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.006000 audit[3164]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561ab5e539c0 a1=4c0fc a2=561ab55f42b0 a3=5 items=0 ppid=627 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.006000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 01:09:21.018381 kernel: FS-Cache: Loaded Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.043711 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.043739 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.043753 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.044781 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.044822 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.045760 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.045791 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.046847 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.046868 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.047832 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.047851 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.048798 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.048826 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.049772 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.049808 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.050768 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.050790 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.051754 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.051775 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.052735 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.052754 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.053716 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.053746 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.054700 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.054728 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.055705 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.055732 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.056697 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.056717 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.057677 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.057700 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.058661 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.058682 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.059634 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.059651 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.060610 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.060633 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.061581 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.061598 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.062552 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.062578 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.063530 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.063558 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.064531 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.064571 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.065505 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.065528 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.066563 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.066581 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.067711 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.067734 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.068764 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.068786 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.069782 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.069798 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.070794 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.070811 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.072446 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.072470 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.072483 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.073431 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.073462 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.074404 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.074436 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.075514 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.075539 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.076502 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.076526 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.077635 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.077658 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.078689 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.078706 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.079670 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.079687 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.080647 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.080664 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.081715 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.081734 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.082698 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.082719 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.083677 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.083714 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.084652 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.084684 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.085622 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.085644 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.086594 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.086622 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.087566 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.087596 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.088536 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.088559 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.089506 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.089524 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.090481 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.090504 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.091466 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.091483 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.092441 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.092460 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.093414 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.093436 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.094391 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.094418 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.095843 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.095863 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.095876 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.096821 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.096843 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.097795 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.097817 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.098769 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.098787 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.099750 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.099773 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.100740 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.100758 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.101711 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.101735 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.102685 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.102703 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.103651 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.103673 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.104628 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.104650 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.034000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.105600 kernel: Failed to create system directory sunrpc Feb 9 01:09:21.113674 kernel: RPC: Registered named UNIX socket transport module. Feb 9 01:09:21.113708 kernel: RPC: Registered udp transport module. Feb 9 01:09:21.113722 kernel: RPC: Registered tcp transport module. Feb 9 01:09:21.113744 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 01:09:21.034000 audit[3164]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561ab5e9fad0 a1=1588c4 a2=561ab55f42b0 a3=5 items=6 ppid=627 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.034000 audit: CWD cwd="/" Feb 9 01:09:21.034000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:09:21.034000 audit: PATH item=1 name=(null) inode=23874 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:09:21.034000 audit: PATH item=2 name=(null) inode=23874 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:09:21.034000 audit: PATH item=3 name=(null) inode=23875 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:09:21.034000 audit: PATH item=4 name=(null) inode=23874 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:09:21.034000 audit: PATH item=5 name=(null) inode=23876 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 01:09:21.034000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.138723 kernel: Failed to create system directory nfs Feb 9 01:09:21.138781 kernel: Failed to create system directory nfs Feb 9 01:09:21.138796 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.139658 kernel: Failed to create system directory nfs Feb 9 01:09:21.139675 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.140722 kernel: Failed to create system directory nfs Feb 9 01:09:21.140742 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.141661 kernel: Failed to create system directory nfs Feb 9 01:09:21.141687 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.142582 kernel: Failed to create system directory nfs Feb 9 01:09:21.142601 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.143533 kernel: Failed to create system directory nfs Feb 9 01:09:21.143558 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.144455 kernel: Failed to create system directory nfs Feb 9 01:09:21.144472 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.145381 kernel: Failed to create system directory nfs Feb 9 01:09:21.145405 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.146746 kernel: Failed to create system directory nfs Feb 9 01:09:21.146772 kernel: Failed to create system directory nfs Feb 9 01:09:21.146786 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.147671 kernel: Failed to create system directory nfs Feb 9 01:09:21.147688 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.148593 kernel: Failed to create system directory nfs Feb 9 01:09:21.148611 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.149513 kernel: Failed to create system directory nfs Feb 9 01:09:21.149536 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.150434 kernel: Failed to create system directory nfs Feb 9 01:09:21.150453 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.151811 kernel: Failed to create system directory nfs Feb 9 01:09:21.151835 kernel: Failed to create system directory nfs Feb 9 01:09:21.151848 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.152732 kernel: Failed to create system directory nfs Feb 9 01:09:21.152755 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.153654 kernel: Failed to create system directory nfs Feb 9 01:09:21.153676 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.154580 kernel: Failed to create system directory nfs Feb 9 01:09:21.154606 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.155497 kernel: Failed to create system directory nfs Feb 9 01:09:21.155515 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.156448 kernel: Failed to create system directory nfs Feb 9 01:09:21.156500 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.157380 kernel: Failed to create system directory nfs Feb 9 01:09:21.157398 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.158760 kernel: Failed to create system directory nfs Feb 9 01:09:21.158779 kernel: Failed to create system directory nfs Feb 9 01:09:21.158797 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.159680 kernel: Failed to create system directory nfs Feb 9 01:09:21.159698 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.160604 kernel: Failed to create system directory nfs Feb 9 01:09:21.160622 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.161518 kernel: Failed to create system directory nfs Feb 9 01:09:21.161541 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.162441 kernel: Failed to create system directory nfs Feb 9 01:09:21.162460 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.163380 kernel: Failed to create system directory nfs Feb 9 01:09:21.163403 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.164762 kernel: Failed to create system directory nfs Feb 9 01:09:21.164782 kernel: Failed to create system directory nfs Feb 9 01:09:21.164795 kernel: Failed to create system directory nfs Feb 9 01:09:21.132000 audit[3164]: AVC avc: denied { confidentiality } for pid=3164 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.132000 audit[3164]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561ab6042680 a1=e29dc a2=561ab55f42b0 a3=5 items=0 ppid=627 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.132000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 01:09:21.180380 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.212792 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.212832 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.212846 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.212866 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.212879 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.213737 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.213767 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.214683 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.214713 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.215623 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.215643 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.216567 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.216585 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.217574 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.217597 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.218591 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.218609 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.219530 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.219547 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.220607 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.220624 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.221542 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.221565 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.222481 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.222500 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.223421 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.223439 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.224823 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.224842 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.224861 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.225759 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.225776 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.226737 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.226756 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.227842 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.227863 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.229828 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.229844 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.229863 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.229878 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.230768 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.230787 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.231706 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.231723 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.232648 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.232664 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.233602 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.233633 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.234538 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.234566 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.235690 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.235712 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.236638 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.236656 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.237586 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.237617 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.238546 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.238574 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.239490 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.239511 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.240560 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.240578 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.241573 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.241590 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.242523 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.242545 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.243480 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.243501 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.244432 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.244457 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.245400 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.245417 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.245471 kubelet[1418]: E0209 01:09:21.245451 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.246841 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.246873 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.246887 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.247775 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.247798 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.248718 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.248741 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.249668 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.249686 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.250611 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.250634 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.251546 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.251574 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.252495 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.253382 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.253417 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.255287 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.255413 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.257503 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.257566 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.201000 audit[3168]: AVC avc: denied { confidentiality } for pid=3168 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.259887 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.260035 kernel: Failed to create system directory nfs4 Feb 9 01:09:21.398623 kernel: NFS: Registering the id_resolver key type Feb 9 01:09:21.398736 kernel: Key type id_resolver registered Feb 9 01:09:21.398750 kernel: Key type id_legacy registered Feb 9 01:09:21.201000 audit[3168]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f647bf7c010 a1=1d3cc4 a2=55812c78b2b0 a3=5 items=0 ppid=627 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.201000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.407606 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.407656 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.407671 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.408580 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.408599 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.409563 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.409582 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.410534 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.410562 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.411508 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.411526 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.412487 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.412505 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.413466 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.413484 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.414443 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.414464 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.415425 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.415454 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.416399 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.416424 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.417383 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.417411 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.418849 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.418885 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.418899 kernel: Failed to create system directory rpcgss Feb 9 01:09:21.404000 audit[3170]: AVC avc: denied { confidentiality } for pid=3170 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 01:09:21.404000 audit[3170]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fced83b0010 a1=4f524 a2=565250c132b0 a3=5 items=0 ppid=627 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.404000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 01:09:21.429352 nfsidmap[3181]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 01:09:21.431538 nfsidmap[3184]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 01:09:21.438000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 01:09:21.438000 audit[1172]: AVC avc: denied { watch_reads } for pid=1172 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 01:09:21.438000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 01:09:21.438000 audit[1172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fb0c828bf0 a2=10 a3=36ccf49118e68ff1 items=0 ppid=1 pid=1172 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.438000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 01:09:21.438000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 01:09:21.438000 audit[1172]: AVC avc: denied { watch_reads } for pid=1172 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 01:09:21.438000 audit[1172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fb0c828bf0 a2=10 a3=36ccf49118e68ff1 items=0 ppid=1 pid=1172 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.438000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 01:09:21.438000 audit[1172]: AVC avc: denied { watch_reads } for pid=1172 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 01:09:21.438000 audit[1172]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fb0c828bf0 a2=10 a3=36ccf49118e68ff1 items=0 ppid=1 pid=1172 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.438000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 01:09:21.546512 systemd-networkd[1012]: cali0bd48e60c20: Gained IPv6LL Feb 9 01:09:21.650262 env[1112]: time="2024-02-09T01:09:21.650217505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2978a88f-d245-4bc4-9352-50ced7c73983,Namespace:default,Attempt:0,}" Feb 9 01:09:21.742381 systemd-networkd[1012]: cali5ec59c6bf6e: Link UP Feb 9 01:09:21.744305 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 01:09:21.744510 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 01:09:21.744608 systemd-networkd[1012]: cali5ec59c6bf6e: Gained carrier Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.694 [INFO][3187] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.4-k8s-test--pod--1-eth0 default 2978a88f-d245-4bc4-9352-50ced7c73983 1204 0 2024-02-09 01:09:08 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.4 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.694 [INFO][3187] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.713 [INFO][3201] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" HandleID="k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Workload="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.721 [INFO][3201] ipam_plugin.go 268: Auto assigning IP ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" HandleID="k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Workload="10.0.0.4-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024ba60), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.4", "pod":"test-pod-1", "timestamp":"2024-02-09 01:09:21.713459188 +0000 UTC"}, Hostname:"10.0.0.4", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.722 [INFO][3201] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.722 [INFO][3201] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.722 [INFO][3201] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.4' Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.723 [INFO][3201] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.726 [INFO][3201] ipam.go 372: Looking up existing affinities for host host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.729 [INFO][3201] ipam.go 489: Trying affinity for 192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.730 [INFO][3201] ipam.go 155: Attempting to load block cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.732 [INFO][3201] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.192/26 host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.732 [INFO][3201] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.192/26 handle="k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.733 [INFO][3201] ipam.go 1682: Creating new handle: k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9 Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.736 [INFO][3201] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.192/26 handle="k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.739 [INFO][3201] ipam.go 1216: Successfully claimed IPs: [192.168.99.197/26] block=192.168.99.192/26 handle="k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.739 [INFO][3201] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.197/26] handle="k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" host="10.0.0.4" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.739 [INFO][3201] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.739 [INFO][3201] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.197/26] IPv6=[] ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" HandleID="k8s-pod-network.a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Workload="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.741 [INFO][3187] k8s.go 385: Populated endpoint ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2978a88f-d245-4bc4-9352-50ced7c73983", ResourceVersion:"1204", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 9, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:09:21.752528 env[1112]: 2024-02-09 01:09:21.741 [INFO][3187] k8s.go 386: Calico CNI using IPs: [192.168.99.197/32] ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 01:09:21.753245 env[1112]: 2024-02-09 01:09:21.741 [INFO][3187] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 01:09:21.753245 env[1112]: 2024-02-09 01:09:21.744 [INFO][3187] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 01:09:21.753245 env[1112]: 2024-02-09 01:09:21.744 [INFO][3187] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.4-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2978a88f-d245-4bc4-9352-50ced7c73983", ResourceVersion:"1204", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 1, 9, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.4", ContainerID:"a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"6a:63:a9:7c:56:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 01:09:21.753245 env[1112]: 2024-02-09 01:09:21.749 [INFO][3187] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.4-k8s-test--pod--1-eth0" Feb 9 01:09:21.760000 audit[3224]: NETFILTER_CFG table=filter:96 family=2 entries=48 op=nft_register_chain pid=3224 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 01:09:21.760000 audit[3224]: SYSCALL arch=c000003e syscall=46 success=yes exit=23120 a0=3 a1=7fffe8edc8a0 a2=0 a3=7fffe8edc88c items=0 ppid=2311 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 01:09:21.769544 env[1112]: time="2024-02-09T01:09:21.769487977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 01:09:21.769544 env[1112]: time="2024-02-09T01:09:21.769529087Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 01:09:21.769647 env[1112]: time="2024-02-09T01:09:21.769540800Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 01:09:21.769714 env[1112]: time="2024-02-09T01:09:21.769677212Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9 pid=3233 runtime=io.containerd.runc.v2 Feb 9 01:09:21.784746 systemd[1]: run-containerd-runc-k8s.io-a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9-runc.Ah4Owf.mount: Deactivated successfully. Feb 9 01:09:21.786108 systemd[1]: Started cri-containerd-a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9.scope. Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.794000 audit: BPF prog-id=124 op=LOAD Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3233 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333031343738663030306333666533643433626361313662303530 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3233 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333031343738663030306333666533643433626361313662303530 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit: BPF prog-id=125 op=LOAD Feb 9 01:09:21.795000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000304630 items=0 ppid=3233 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333031343738663030306333666533643433626361313662303530 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit: BPF prog-id=126 op=LOAD Feb 9 01:09:21.795000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000304678 items=0 ppid=3233 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333031343738663030306333666533643433626361313662303530 Feb 9 01:09:21.795000 audit: BPF prog-id=126 op=UNLOAD Feb 9 01:09:21.795000 audit: BPF prog-id=125 op=UNLOAD Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:21.795000 audit: BPF prog-id=127 op=LOAD Feb 9 01:09:21.795000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000304a88 items=0 ppid=3233 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:21.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135333031343738663030306333666533643433626361313662303530 Feb 9 01:09:21.797028 systemd-resolved[1057]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 01:09:21.816442 env[1112]: time="2024-02-09T01:09:21.816350393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2978a88f-d245-4bc4-9352-50ced7c73983,Namespace:default,Attempt:0,} returns sandbox id \"a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9\"" Feb 9 01:09:22.245765 kubelet[1418]: E0209 01:09:22.245740 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:23.246332 kubelet[1418]: E0209 01:09:23.246286 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:23.338528 systemd-networkd[1012]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 01:09:24.246849 kubelet[1418]: E0209 01:09:24.246782 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:24.397912 env[1112]: time="2024-02-09T01:09:24.397852783Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:24.399575 env[1112]: time="2024-02-09T01:09:24.399519641Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:24.401200 env[1112]: time="2024-02-09T01:09:24.401165049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:24.402570 env[1112]: time="2024-02-09T01:09:24.402545456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:24.403140 env[1112]: time="2024-02-09T01:09:24.403099091Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 01:09:24.403745 env[1112]: time="2024-02-09T01:09:24.403638700Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 01:09:24.404553 env[1112]: time="2024-02-09T01:09:24.404521128Z" level=info msg="CreateContainer within sandbox \"a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 01:09:24.414268 env[1112]: time="2024-02-09T01:09:24.414227612Z" level=info msg="CreateContainer within sandbox \"a5522b26f38495737b5f50977ad0729dea32dac514aa1fa29003a7224b06eb54\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1dd68072dcdede091bddfa708ba83422ced35623d74b4b6b49a20b2aed7fe034\"" Feb 9 01:09:24.414599 env[1112]: time="2024-02-09T01:09:24.414561695Z" level=info msg="StartContainer for \"1dd68072dcdede091bddfa708ba83422ced35623d74b4b6b49a20b2aed7fe034\"" Feb 9 01:09:24.432935 systemd[1]: Started cri-containerd-1dd68072dcdede091bddfa708ba83422ced35623d74b4b6b49a20b2aed7fe034.scope. Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit: BPF prog-id=128 op=LOAD Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3127 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643638303732646364656465303931626464666137303862613833 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3127 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643638303732646364656465303931626464666137303862613833 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.441000 audit: BPF prog-id=129 op=LOAD Feb 9 01:09:24.441000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ea370 items=0 ppid=3127 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643638303732646364656465303931626464666137303862613833 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit: BPF prog-id=130 op=LOAD Feb 9 01:09:24.442000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003ea3b8 items=0 ppid=3127 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643638303732646364656465303931626464666137303862613833 Feb 9 01:09:24.442000 audit: BPF prog-id=130 op=UNLOAD Feb 9 01:09:24.442000 audit: BPF prog-id=129 op=UNLOAD Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { perfmon } for pid=3272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit[3272]: AVC avc: denied { bpf } for pid=3272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.442000 audit: BPF prog-id=131 op=LOAD Feb 9 01:09:24.442000 audit[3272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ea7c8 items=0 ppid=3127 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164643638303732646364656465303931626464666137303862613833 Feb 9 01:09:24.465566 env[1112]: time="2024-02-09T01:09:24.465516627Z" level=info msg="StartContainer for \"1dd68072dcdede091bddfa708ba83422ced35623d74b4b6b49a20b2aed7fe034\" returns successfully" Feb 9 01:09:24.475624 kubelet[1418]: I0209 01:09:24.475594 1418 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6554b95969-6gcms" podStartSLOduration=-9.223372031379211e+09 pod.CreationTimestamp="2024-02-09 01:09:19 +0000 UTC" firstStartedPulling="2024-02-09 01:09:20.37000283 +0000 UTC m=+89.545985215" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 01:09:24.475519582 +0000 UTC m=+93.651501957" watchObservedRunningTime="2024-02-09 01:09:24.47556489 +0000 UTC m=+93.651547275" Feb 9 01:09:24.509000 audit[3332]: NETFILTER_CFG table=filter:97 family=2 entries=8 op=nft_register_rule pid=3332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:24.509000 audit[3332]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffeee4b8ae0 a2=0 a3=7ffeee4b8acc items=0 ppid=1768 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:24.512000 audit[3332]: NETFILTER_CFG table=nat:98 family=2 entries=198 op=nft_register_rule pid=3332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:24.512000 audit[3332]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffeee4b8ae0 a2=0 a3=7ffeee4b8acc items=0 ppid=1768 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:24.845181 env[1112]: time="2024-02-09T01:09:24.845062888Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:24.846823 env[1112]: time="2024-02-09T01:09:24.846798369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:24.848302 env[1112]: time="2024-02-09T01:09:24.848268408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:24.849593 env[1112]: time="2024-02-09T01:09:24.849565845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 01:09:24.850125 env[1112]: time="2024-02-09T01:09:24.850089784Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 01:09:24.851705 env[1112]: time="2024-02-09T01:09:24.851675296Z" level=info msg="CreateContainer within sandbox \"a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 01:09:24.862724 env[1112]: time="2024-02-09T01:09:24.862676752Z" level=info msg="CreateContainer within sandbox \"a5301478f000c3fe3d43bca16b05082bda2971ff3a65936754e52758c45c91a9\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"ab8e15fa11009556ca9886db250ee63ed16876e2758a9c2dcfad327aa16d2dbf\"" Feb 9 01:09:24.863038 env[1112]: time="2024-02-09T01:09:24.862998633Z" level=info msg="StartContainer for \"ab8e15fa11009556ca9886db250ee63ed16876e2758a9c2dcfad327aa16d2dbf\"" Feb 9 01:09:24.875764 systemd[1]: Started cri-containerd-ab8e15fa11009556ca9886db250ee63ed16876e2758a9c2dcfad327aa16d2dbf.scope. Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit: BPF prog-id=132 op=LOAD Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3233 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386531356661313130303935353663613938383664623235306565 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3233 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386531356661313130303935353663613938383664623235306565 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit: BPF prog-id=133 op=LOAD Feb 9 01:09:24.887000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030cde0 items=0 ppid=3233 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386531356661313130303935353663613938383664623235306565 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit: BPF prog-id=134 op=LOAD Feb 9 01:09:24.887000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030ce28 items=0 ppid=3233 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386531356661313130303935353663613938383664623235306565 Feb 9 01:09:24.887000 audit: BPF prog-id=134 op=UNLOAD Feb 9 01:09:24.887000 audit: BPF prog-id=133 op=UNLOAD Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 01:09:24.887000 audit: BPF prog-id=135 op=LOAD Feb 9 01:09:24.887000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030d238 items=0 ppid=3233 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:24.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162386531356661313130303935353663613938383664623235306565 Feb 9 01:09:24.899822 env[1112]: time="2024-02-09T01:09:24.899779231Z" level=info msg="StartContainer for \"ab8e15fa11009556ca9886db250ee63ed16876e2758a9c2dcfad327aa16d2dbf\" returns successfully" Feb 9 01:09:24.994000 audit[3284]: AVC avc: denied { watch } for pid=3284 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_01_09_19.3744924446/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c957 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c329,c957 tclass=file permissive=0 Feb 9 01:09:24.994000 audit[3284]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000436c40 a2=fc6 a3=0 items=0 ppid=3127 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c957 key=(null) Feb 9 01:09:24.994000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 01:09:25.247765 kubelet[1418]: E0209 01:09:25.247709 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:25.307000 audit[3415]: NETFILTER_CFG table=filter:99 family=2 entries=8 op=nft_register_rule pid=3415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:25.307000 audit[3415]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdaf8b7eb0 a2=0 a3=7ffdaf8b7e9c items=0 ppid=1768 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:25.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:25.309000 audit[3415]: NETFILTER_CFG table=nat:100 family=2 entries=198 op=nft_register_rule pid=3415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:25.312699 kernel: kauditd_printk_skb: 590 callbacks suppressed Feb 9 01:09:25.312767 kernel: audit: type=1325 audit(1707440965.309:924): table=nat:100 family=2 entries=198 op=nft_register_rule pid=3415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 01:09:25.309000 audit[3415]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffdaf8b7eb0 a2=0 a3=7ffdaf8b7e9c items=0 ppid=1768 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:25.317284 kernel: audit: type=1300 audit(1707440965.309:924): arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffdaf8b7eb0 a2=0 a3=7ffdaf8b7e9c items=0 ppid=1768 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 01:09:25.317402 kernel: audit: type=1327 audit(1707440965.309:924): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:25.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 01:09:25.476794 kubelet[1418]: I0209 01:09:25.476768 1418 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.22337201937804e+09 pod.CreationTimestamp="2024-02-09 01:09:08 +0000 UTC" firstStartedPulling="2024-02-09 01:09:21.819038068 +0000 UTC m=+90.995020453" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 01:09:25.476500559 +0000 UTC m=+94.652482944" watchObservedRunningTime="2024-02-09 01:09:25.476735462 +0000 UTC m=+94.652717837" Feb 9 01:09:26.247909 kubelet[1418]: E0209 01:09:26.247879 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:27.248769 kubelet[1418]: E0209 01:09:27.248743 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:28.249835 kubelet[1418]: E0209 01:09:28.249810 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:29.250074 kubelet[1418]: E0209 01:09:29.250041 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:30.250911 kubelet[1418]: E0209 01:09:30.250873 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:31.193786 kubelet[1418]: E0209 01:09:31.193743 1418 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 01:09:31.250988 kubelet[1418]: E0209 01:09:31.250965 1418 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"