Feb 9 19:42:43.902211 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:42:43.902232 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:42:43.902243 kernel: BIOS-provided physical RAM map: Feb 9 19:42:43.902248 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 19:42:43.902253 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 19:42:43.902259 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 19:42:43.902265 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 19:42:43.902271 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 19:42:43.902277 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 19:42:43.902283 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 19:42:43.902289 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Feb 9 19:42:43.902294 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 19:42:43.902300 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 19:42:43.902306 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 19:42:43.902313 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 19:42:43.902320 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 19:42:43.902326 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 19:42:43.902332 kernel: NX (Execute Disable) protection: active Feb 9 19:42:43.902337 kernel: e820: update [mem 0x9b3fa018-0x9b403c57] usable ==> usable Feb 9 19:42:43.902343 kernel: e820: update [mem 0x9b3fa018-0x9b403c57] usable ==> usable Feb 9 19:42:43.902349 kernel: e820: update [mem 0x9b3bd018-0x9b3f9e57] usable ==> usable Feb 9 19:42:43.902355 kernel: e820: update [mem 0x9b3bd018-0x9b3f9e57] usable ==> usable Feb 9 19:42:43.902364 kernel: extended physical RAM map: Feb 9 19:42:43.902370 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 19:42:43.902376 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 9 19:42:43.902383 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 9 19:42:43.902389 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Feb 9 19:42:43.902395 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 9 19:42:43.902401 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 9 19:42:43.902407 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 9 19:42:43.902413 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b3bd017] usable Feb 9 19:42:43.902419 kernel: reserve setup_data: [mem 0x000000009b3bd018-0x000000009b3f9e57] usable Feb 9 19:42:43.902424 kernel: reserve setup_data: [mem 0x000000009b3f9e58-0x000000009b3fa017] usable Feb 9 19:42:43.902430 kernel: reserve setup_data: [mem 0x000000009b3fa018-0x000000009b403c57] usable Feb 9 19:42:43.902436 kernel: reserve setup_data: [mem 0x000000009b403c58-0x000000009c8eefff] usable Feb 9 19:42:43.902442 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 9 19:42:43.902449 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 9 19:42:43.902455 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 9 19:42:43.902461 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 9 19:42:43.902467 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 9 19:42:43.902487 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 9 19:42:43.902493 kernel: efi: EFI v2.70 by EDK II Feb 9 19:42:43.902500 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Feb 9 19:42:43.902508 kernel: random: crng init done Feb 9 19:42:43.902514 kernel: SMBIOS 2.8 present. Feb 9 19:42:43.902521 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Feb 9 19:42:43.902527 kernel: Hypervisor detected: KVM Feb 9 19:42:43.902534 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:42:43.902540 kernel: kvm-clock: cpu 0, msr 2bfaa001, primary cpu clock Feb 9 19:42:43.902546 kernel: kvm-clock: using sched offset of 4627085041 cycles Feb 9 19:42:43.902553 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:42:43.902560 kernel: tsc: Detected 2794.750 MHz processor Feb 9 19:42:43.902580 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:42:43.902587 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:42:43.902593 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Feb 9 19:42:43.902600 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:42:43.902607 kernel: Using GB pages for direct mapping Feb 9 19:42:43.902613 kernel: Secure boot disabled Feb 9 19:42:43.902620 kernel: ACPI: Early table checksum verification disabled Feb 9 19:42:43.902626 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Feb 9 19:42:43.902633 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Feb 9 19:42:43.902641 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:42:43.902648 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:42:43.902654 kernel: ACPI: FACS 0x000000009CBDD000 000040 Feb 9 19:42:43.902661 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:42:43.902667 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:42:43.902674 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:42:43.902681 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Feb 9 19:42:43.902687 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Feb 9 19:42:43.902696 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Feb 9 19:42:43.902705 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Feb 9 19:42:43.902711 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Feb 9 19:42:43.902718 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Feb 9 19:42:43.902724 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Feb 9 19:42:43.902731 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Feb 9 19:42:43.902737 kernel: No NUMA configuration found Feb 9 19:42:43.902744 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Feb 9 19:42:43.902750 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Feb 9 19:42:43.902757 kernel: Zone ranges: Feb 9 19:42:43.902764 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:42:43.902771 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Feb 9 19:42:43.902777 kernel: Normal empty Feb 9 19:42:43.902784 kernel: Movable zone start for each node Feb 9 19:42:43.902790 kernel: Early memory node ranges Feb 9 19:42:43.902799 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 19:42:43.902817 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Feb 9 19:42:43.902824 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Feb 9 19:42:43.902831 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Feb 9 19:42:43.902839 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Feb 9 19:42:43.902845 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Feb 9 19:42:43.902852 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Feb 9 19:42:43.902858 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:42:43.902865 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 19:42:43.902871 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Feb 9 19:42:43.902878 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:42:43.902884 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Feb 9 19:42:43.902890 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Feb 9 19:42:43.902898 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Feb 9 19:42:43.902905 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:42:43.902911 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:42:43.902918 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:42:43.902924 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 19:42:43.902931 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:42:43.902937 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:42:43.902944 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:42:43.902950 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:42:43.902958 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:42:43.902965 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 19:42:43.902971 kernel: TSC deadline timer available Feb 9 19:42:43.902977 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 9 19:42:43.902984 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 9 19:42:43.902990 kernel: kvm-guest: setup PV sched yield Feb 9 19:42:43.902999 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Feb 9 19:42:43.903006 kernel: Booting paravirtualized kernel on KVM Feb 9 19:42:43.903013 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:42:43.903019 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 9 19:42:43.903029 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 9 19:42:43.903036 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 9 19:42:43.903048 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 9 19:42:43.903067 kernel: kvm-guest: setup async PF for cpu 0 Feb 9 19:42:43.903075 kernel: kvm-guest: stealtime: cpu 0, msr 9b01c0c0 Feb 9 19:42:43.903082 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:42:43.903088 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:42:43.903095 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Feb 9 19:42:43.903102 kernel: Policy zone: DMA32 Feb 9 19:42:43.903110 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:42:43.903117 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:42:43.903126 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:42:43.903133 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:42:43.903140 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:42:43.903147 kernel: Memory: 2400512K/2567000K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 166228K reserved, 0K cma-reserved) Feb 9 19:42:43.903156 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 9 19:42:43.903163 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:42:43.903170 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:42:43.903177 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:42:43.903184 kernel: rcu: RCU event tracing is enabled. Feb 9 19:42:43.903191 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 9 19:42:43.903198 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:42:43.903207 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:42:43.903215 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:42:43.903225 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 9 19:42:43.903232 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 9 19:42:43.903239 kernel: Console: colour dummy device 80x25 Feb 9 19:42:43.903246 kernel: printk: console [ttyS0] enabled Feb 9 19:42:43.903253 kernel: ACPI: Core revision 20210730 Feb 9 19:42:43.903260 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 9 19:42:43.903267 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:42:43.903273 kernel: x2apic enabled Feb 9 19:42:43.903280 kernel: Switched APIC routing to physical x2apic. Feb 9 19:42:43.903287 kernel: kvm-guest: setup PV IPIs Feb 9 19:42:43.903295 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 19:42:43.903302 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 19:42:43.903309 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 9 19:42:43.903316 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 9 19:42:43.903323 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 9 19:42:43.903330 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 9 19:42:43.903337 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:42:43.903344 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:42:43.903352 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:42:43.903359 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:42:43.903366 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 9 19:42:43.903373 kernel: RETBleed: Mitigation: untrained return thunk Feb 9 19:42:43.903382 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:42:43.903389 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:42:43.903396 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:42:43.903403 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:42:43.903412 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:42:43.903420 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:42:43.903427 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 19:42:43.903434 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:42:43.903441 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:42:43.903447 kernel: LSM: Security Framework initializing Feb 9 19:42:43.903454 kernel: SELinux: Initializing. Feb 9 19:42:43.903461 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 19:42:43.903468 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 19:42:43.903484 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 9 19:42:43.903493 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 9 19:42:43.903500 kernel: ... version: 0 Feb 9 19:42:43.903506 kernel: ... bit width: 48 Feb 9 19:42:43.903513 kernel: ... generic registers: 6 Feb 9 19:42:43.903520 kernel: ... value mask: 0000ffffffffffff Feb 9 19:42:43.903527 kernel: ... max period: 00007fffffffffff Feb 9 19:42:43.903533 kernel: ... fixed-purpose events: 0 Feb 9 19:42:43.903540 kernel: ... event mask: 000000000000003f Feb 9 19:42:43.903547 kernel: signal: max sigframe size: 1776 Feb 9 19:42:43.903555 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:42:43.903568 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:42:43.903574 kernel: x86: Booting SMP configuration: Feb 9 19:42:43.903581 kernel: .... node #0, CPUs: #1 Feb 9 19:42:43.903588 kernel: kvm-clock: cpu 1, msr 2bfaa041, secondary cpu clock Feb 9 19:42:43.903595 kernel: kvm-guest: setup async PF for cpu 1 Feb 9 19:42:43.903602 kernel: kvm-guest: stealtime: cpu 1, msr 9b09c0c0 Feb 9 19:42:43.903608 kernel: #2 Feb 9 19:42:43.903615 kernel: kvm-clock: cpu 2, msr 2bfaa081, secondary cpu clock Feb 9 19:42:43.903622 kernel: kvm-guest: setup async PF for cpu 2 Feb 9 19:42:43.903631 kernel: kvm-guest: stealtime: cpu 2, msr 9b11c0c0 Feb 9 19:42:43.903637 kernel: #3 Feb 9 19:42:43.903644 kernel: kvm-clock: cpu 3, msr 2bfaa0c1, secondary cpu clock Feb 9 19:42:43.903651 kernel: kvm-guest: setup async PF for cpu 3 Feb 9 19:42:43.903658 kernel: kvm-guest: stealtime: cpu 3, msr 9b19c0c0 Feb 9 19:42:43.903664 kernel: smp: Brought up 1 node, 4 CPUs Feb 9 19:42:43.903671 kernel: smpboot: Max logical packages: 1 Feb 9 19:42:43.903678 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 9 19:42:43.903685 kernel: devtmpfs: initialized Feb 9 19:42:43.903693 kernel: x86/mm: Memory block size: 128MB Feb 9 19:42:43.903700 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Feb 9 19:42:43.903707 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Feb 9 19:42:43.903714 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Feb 9 19:42:43.903721 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Feb 9 19:42:43.903730 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Feb 9 19:42:43.903738 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:42:43.903745 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 9 19:42:43.903751 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:42:43.903760 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:42:43.903767 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:42:43.903774 kernel: audit: type=2000 audit(1707507763.526:1): state=initialized audit_enabled=0 res=1 Feb 9 19:42:43.903780 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:42:43.903787 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:42:43.903794 kernel: cpuidle: using governor menu Feb 9 19:42:43.903801 kernel: ACPI: bus type PCI registered Feb 9 19:42:43.903808 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:42:43.903814 kernel: dca service started, version 1.12.1 Feb 9 19:42:43.903823 kernel: PCI: Using configuration type 1 for base access Feb 9 19:42:43.903830 kernel: PCI: Using configuration type 1 for extended access Feb 9 19:42:43.903837 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:42:43.903844 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:42:43.903851 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:42:43.903857 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:42:43.903864 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:42:43.903871 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:42:43.903878 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:42:43.903886 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:42:43.903893 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:42:43.903900 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:42:43.903907 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:42:43.903914 kernel: ACPI: Interpreter enabled Feb 9 19:42:43.903921 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:42:43.903928 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:42:43.903935 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:42:43.903941 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 19:42:43.903949 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:42:43.904104 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:42:43.904117 kernel: acpiphp: Slot [3] registered Feb 9 19:42:43.904124 kernel: acpiphp: Slot [4] registered Feb 9 19:42:43.904131 kernel: acpiphp: Slot [5] registered Feb 9 19:42:43.904137 kernel: acpiphp: Slot [6] registered Feb 9 19:42:43.904144 kernel: acpiphp: Slot [7] registered Feb 9 19:42:43.904151 kernel: acpiphp: Slot [8] registered Feb 9 19:42:43.904160 kernel: acpiphp: Slot [9] registered Feb 9 19:42:43.904167 kernel: acpiphp: Slot [10] registered Feb 9 19:42:43.904173 kernel: acpiphp: Slot [11] registered Feb 9 19:42:43.904180 kernel: acpiphp: Slot [12] registered Feb 9 19:42:43.904187 kernel: acpiphp: Slot [13] registered Feb 9 19:42:43.904194 kernel: acpiphp: Slot [14] registered Feb 9 19:42:43.904200 kernel: acpiphp: Slot [15] registered Feb 9 19:42:43.904207 kernel: acpiphp: Slot [16] registered Feb 9 19:42:43.904214 kernel: acpiphp: Slot [17] registered Feb 9 19:42:43.904221 kernel: acpiphp: Slot [18] registered Feb 9 19:42:43.904231 kernel: acpiphp: Slot [19] registered Feb 9 19:42:43.904239 kernel: acpiphp: Slot [20] registered Feb 9 19:42:43.904247 kernel: acpiphp: Slot [21] registered Feb 9 19:42:43.904255 kernel: acpiphp: Slot [22] registered Feb 9 19:42:43.904261 kernel: acpiphp: Slot [23] registered Feb 9 19:42:43.904268 kernel: acpiphp: Slot [24] registered Feb 9 19:42:43.904275 kernel: acpiphp: Slot [25] registered Feb 9 19:42:43.904281 kernel: acpiphp: Slot [26] registered Feb 9 19:42:43.904288 kernel: acpiphp: Slot [27] registered Feb 9 19:42:43.904296 kernel: acpiphp: Slot [28] registered Feb 9 19:42:43.904303 kernel: acpiphp: Slot [29] registered Feb 9 19:42:43.904310 kernel: acpiphp: Slot [30] registered Feb 9 19:42:43.904316 kernel: acpiphp: Slot [31] registered Feb 9 19:42:43.904323 kernel: PCI host bridge to bus 0000:00 Feb 9 19:42:43.904417 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:42:43.904496 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:42:43.904567 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:42:43.904638 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 9 19:42:43.904706 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Feb 9 19:42:43.904791 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:42:43.904895 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:42:43.904991 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 19:42:43.905090 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 19:42:43.905172 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 9 19:42:43.905247 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 19:42:43.905320 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 19:42:43.905394 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 19:42:43.905525 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 19:42:43.905693 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:42:43.905818 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:42:43.905901 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 9 19:42:43.906002 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 9 19:42:43.906078 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Feb 9 19:42:43.906151 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Feb 9 19:42:43.906224 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Feb 9 19:42:43.906314 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Feb 9 19:42:43.906396 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 19:42:43.906504 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:42:43.906590 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 9 19:42:43.906671 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Feb 9 19:42:43.906746 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Feb 9 19:42:43.906836 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 19:42:43.906913 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 19:42:43.906987 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Feb 9 19:42:43.907065 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Feb 9 19:42:43.907158 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:42:43.907233 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 19:42:43.907312 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Feb 9 19:42:43.907386 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Feb 9 19:42:43.907461 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Feb 9 19:42:43.907497 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:42:43.907509 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:42:43.907516 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:42:43.907523 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:42:43.907530 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:42:43.907537 kernel: iommu: Default domain type: Translated Feb 9 19:42:43.907544 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:42:43.907632 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 19:42:43.907704 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 19:42:43.907775 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 19:42:43.907787 kernel: vgaarb: loaded Feb 9 19:42:43.907794 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:42:43.907801 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:42:43.907808 kernel: PTP clock support registered Feb 9 19:42:43.907815 kernel: Registered efivars operations Feb 9 19:42:43.907822 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:42:43.907829 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:42:43.907836 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Feb 9 19:42:43.907843 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Feb 9 19:42:43.907851 kernel: e820: reserve RAM buffer [mem 0x9b3bd018-0x9bffffff] Feb 9 19:42:43.907857 kernel: e820: reserve RAM buffer [mem 0x9b3fa018-0x9bffffff] Feb 9 19:42:43.907864 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Feb 9 19:42:43.907871 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Feb 9 19:42:43.907878 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 9 19:42:43.907885 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 9 19:42:43.907892 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:42:43.907899 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:42:43.907906 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:42:43.907914 kernel: pnp: PnP ACPI init Feb 9 19:42:43.908005 kernel: pnp 00:02: [dma 2] Feb 9 19:42:43.908015 kernel: pnp: PnP ACPI: found 6 devices Feb 9 19:42:43.908023 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:42:43.908030 kernel: NET: Registered PF_INET protocol family Feb 9 19:42:43.908037 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:42:43.908044 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 19:42:43.908051 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:42:43.908060 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:42:43.908067 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 19:42:43.908074 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 19:42:43.908081 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 19:42:43.908088 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 19:42:43.908095 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:42:43.908102 kernel: NET: Registered PF_XDP protocol family Feb 9 19:42:43.908179 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Feb 9 19:42:43.908267 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Feb 9 19:42:43.908336 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:42:43.908449 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:42:43.908573 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:42:43.908647 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 9 19:42:43.908715 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Feb 9 19:42:43.908792 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 19:42:43.908918 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:42:43.909003 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 19:42:43.909013 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:42:43.909021 kernel: Initialise system trusted keyrings Feb 9 19:42:43.909028 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 19:42:43.909035 kernel: Key type asymmetric registered Feb 9 19:42:43.909042 kernel: Asymmetric key parser 'x509' registered Feb 9 19:42:43.909050 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:42:43.909057 kernel: io scheduler mq-deadline registered Feb 9 19:42:43.909066 kernel: io scheduler kyber registered Feb 9 19:42:43.909074 kernel: io scheduler bfq registered Feb 9 19:42:43.909081 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:42:43.909088 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:42:43.909095 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 19:42:43.909103 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:42:43.909110 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:42:43.909117 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:42:43.909124 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:42:43.909132 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:42:43.909140 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:42:43.909231 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 9 19:42:43.909244 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:42:43.909313 kernel: rtc_cmos 00:05: registered as rtc0 Feb 9 19:42:43.909384 kernel: rtc_cmos 00:05: setting system clock to 2024-02-09T19:42:43 UTC (1707507763) Feb 9 19:42:43.909519 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 9 19:42:43.909530 kernel: efifb: probing for efifb Feb 9 19:42:43.909538 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Feb 9 19:42:43.909545 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Feb 9 19:42:43.909553 kernel: efifb: scrolling: redraw Feb 9 19:42:43.909560 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 19:42:43.909575 kernel: Console: switching to colour frame buffer device 160x50 Feb 9 19:42:43.909583 kernel: fb0: EFI VGA frame buffer device Feb 9 19:42:43.909593 kernel: pstore: Registered efi as persistent store backend Feb 9 19:42:43.909600 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:42:43.909608 kernel: Segment Routing with IPv6 Feb 9 19:42:43.909615 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:42:43.909622 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:42:43.909629 kernel: Key type dns_resolver registered Feb 9 19:42:43.909636 kernel: IPI shorthand broadcast: enabled Feb 9 19:42:43.909644 kernel: sched_clock: Marking stable (455114304, 91373886)->(580524002, -34035812) Feb 9 19:42:43.909651 kernel: registered taskstats version 1 Feb 9 19:42:43.909659 kernel: Loading compiled-in X.509 certificates Feb 9 19:42:43.909667 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:42:43.909675 kernel: Key type .fscrypt registered Feb 9 19:42:43.909682 kernel: Key type fscrypt-provisioning registered Feb 9 19:42:43.909689 kernel: pstore: Using crash dump compression: deflate Feb 9 19:42:43.909696 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:42:43.909704 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:42:43.909711 kernel: ima: No architecture policies found Feb 9 19:42:43.909718 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:42:43.909726 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:42:43.909734 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:42:43.909742 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:42:43.909749 kernel: Run /init as init process Feb 9 19:42:43.909757 kernel: with arguments: Feb 9 19:42:43.909764 kernel: /init Feb 9 19:42:43.909771 kernel: with environment: Feb 9 19:42:43.909778 kernel: HOME=/ Feb 9 19:42:43.909785 kernel: TERM=linux Feb 9 19:42:43.909793 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:42:43.909802 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:42:43.909812 systemd[1]: Detected virtualization kvm. Feb 9 19:42:43.909820 systemd[1]: Detected architecture x86-64. Feb 9 19:42:43.909828 systemd[1]: Running in initrd. Feb 9 19:42:43.909836 systemd[1]: No hostname configured, using default hostname. Feb 9 19:42:43.909843 systemd[1]: Hostname set to . Feb 9 19:42:43.909853 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:42:43.909861 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:42:43.909868 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:42:43.909876 systemd[1]: Reached target cryptsetup.target. Feb 9 19:42:43.909884 systemd[1]: Reached target paths.target. Feb 9 19:42:43.909892 systemd[1]: Reached target slices.target. Feb 9 19:42:43.909899 systemd[1]: Reached target swap.target. Feb 9 19:42:43.909907 systemd[1]: Reached target timers.target. Feb 9 19:42:43.909916 systemd[1]: Listening on iscsid.socket. Feb 9 19:42:43.909924 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:42:43.909932 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:42:43.909940 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:42:43.909948 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:42:43.909956 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:42:43.909963 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:42:43.909971 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:42:43.909979 systemd[1]: Reached target sockets.target. Feb 9 19:42:43.909988 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:42:43.909996 systemd[1]: Finished network-cleanup.service. Feb 9 19:42:43.910004 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:42:43.910012 systemd[1]: Starting systemd-journald.service... Feb 9 19:42:43.910020 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:42:43.910028 systemd[1]: Starting systemd-resolved.service... Feb 9 19:42:43.910036 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:42:43.910043 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:42:43.910051 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:42:43.910061 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:42:43.910069 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:42:43.910077 kernel: audit: type=1130 audit(1707507763.901:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.910085 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:42:43.910093 kernel: audit: type=1130 audit(1707507763.905:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.910104 systemd-journald[197]: Journal started Feb 9 19:42:43.910144 systemd-journald[197]: Runtime Journal (/run/log/journal/7a1fe77b391242c88cc6f0493febfcaf) is 6.0M, max 48.4M, 42.4M free. Feb 9 19:42:43.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.906280 systemd-modules-load[198]: Inserted module 'overlay' Feb 9 19:42:43.915059 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:42:43.915073 systemd[1]: Started systemd-journald.service. Feb 9 19:42:43.915082 kernel: audit: type=1130 audit(1707507763.912:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.925463 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:42:43.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.928886 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:42:43.930007 kernel: audit: type=1130 audit(1707507763.925:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.930034 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:42:43.935038 systemd-modules-load[198]: Inserted module 'br_netfilter' Feb 9 19:42:43.935829 kernel: Bridge firewalling registered Feb 9 19:42:43.938448 dracut-cmdline[215]: dracut-dracut-053 Feb 9 19:42:43.940864 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:42:43.949501 kernel: SCSI subsystem initialized Feb 9 19:42:43.950706 systemd-resolved[199]: Positive Trust Anchors: Feb 9 19:42:43.950742 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:42:43.950781 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:42:43.959725 systemd-resolved[199]: Defaulting to hostname 'linux'. Feb 9 19:42:43.961470 systemd[1]: Started systemd-resolved.service. Feb 9 19:42:43.964604 kernel: audit: type=1130 audit(1707507763.961:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.961629 systemd[1]: Reached target nss-lookup.target. Feb 9 19:42:43.968913 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:42:43.968930 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:42:43.968939 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:42:43.971669 systemd-modules-load[198]: Inserted module 'dm_multipath' Feb 9 19:42:43.972413 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:42:43.976510 kernel: audit: type=1130 audit(1707507763.972:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.973958 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:42:43.982871 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:42:43.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:43.986507 kernel: audit: type=1130 audit(1707507763.983:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:44.004494 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:42:44.015494 kernel: iscsi: registered transport (tcp) Feb 9 19:42:44.035536 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:42:44.035651 kernel: QLogic iSCSI HBA Driver Feb 9 19:42:44.069871 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:42:44.072899 kernel: audit: type=1130 audit(1707507764.069:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:44.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:44.072901 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:42:44.119500 kernel: raid6: avx2x4 gen() 30596 MB/s Feb 9 19:42:44.136486 kernel: raid6: avx2x4 xor() 7785 MB/s Feb 9 19:42:44.161487 kernel: raid6: avx2x2 gen() 32702 MB/s Feb 9 19:42:44.178506 kernel: raid6: avx2x2 xor() 18471 MB/s Feb 9 19:42:44.195492 kernel: raid6: avx2x1 gen() 26276 MB/s Feb 9 19:42:44.220488 kernel: raid6: avx2x1 xor() 15396 MB/s Feb 9 19:42:44.237490 kernel: raid6: sse2x4 gen() 14727 MB/s Feb 9 19:42:44.254488 kernel: raid6: sse2x4 xor() 7410 MB/s Feb 9 19:42:44.275520 kernel: raid6: sse2x2 gen() 16470 MB/s Feb 9 19:42:44.292497 kernel: raid6: sse2x2 xor() 9862 MB/s Feb 9 19:42:44.311496 kernel: raid6: sse2x1 gen() 11551 MB/s Feb 9 19:42:44.328504 kernel: raid6: sse2x1 xor() 7779 MB/s Feb 9 19:42:44.328569 kernel: raid6: using algorithm avx2x2 gen() 32702 MB/s Feb 9 19:42:44.328579 kernel: raid6: .... xor() 18471 MB/s, rmw enabled Feb 9 19:42:44.329502 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:42:44.340493 kernel: xor: automatically using best checksumming function avx Feb 9 19:42:44.437520 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:42:44.446750 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:42:44.450271 kernel: audit: type=1130 audit(1707507764.446:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:44.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:44.449000 audit: BPF prog-id=7 op=LOAD Feb 9 19:42:44.449000 audit: BPF prog-id=8 op=LOAD Feb 9 19:42:44.450815 systemd[1]: Starting systemd-udevd.service... Feb 9 19:42:44.463364 systemd-udevd[400]: Using default interface naming scheme 'v252'. Feb 9 19:42:44.468423 systemd[1]: Started systemd-udevd.service. Feb 9 19:42:44.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:44.469504 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:42:44.481654 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Feb 9 19:42:44.507720 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:42:44.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:44.509812 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:42:44.548737 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:42:44.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:44.581493 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:42:44.584497 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 9 19:42:44.587687 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:42:44.587710 kernel: GPT:9289727 != 19775487 Feb 9 19:42:44.587725 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:42:44.588644 kernel: GPT:9289727 != 19775487 Feb 9 19:42:44.588667 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:42:44.591440 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:42:44.591463 kernel: libata version 3.00 loaded. Feb 9 19:42:44.594492 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 19:42:44.598494 kernel: scsi host0: ata_piix Feb 9 19:42:44.602904 kernel: scsi host1: ata_piix Feb 9 19:42:44.603041 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 9 19:42:44.603052 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 9 19:42:44.607573 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:42:44.607636 kernel: AES CTR mode by8 optimization enabled Feb 9 19:42:44.619459 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:42:44.621415 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (462) Feb 9 19:42:44.625005 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:42:44.631639 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:42:44.632391 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:42:44.636698 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:42:44.638085 systemd[1]: Starting disk-uuid.service... Feb 9 19:42:44.757215 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 9 19:42:44.757247 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 9 19:42:44.792659 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 9 19:42:44.792816 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 19:42:44.810510 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 9 19:42:44.818656 disk-uuid[516]: Primary Header is updated. Feb 9 19:42:44.818656 disk-uuid[516]: Secondary Entries is updated. Feb 9 19:42:44.818656 disk-uuid[516]: Secondary Header is updated. Feb 9 19:42:44.821495 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:42:44.824490 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:42:45.826355 disk-uuid[529]: The operation has completed successfully. Feb 9 19:42:45.827767 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:42:45.852084 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:42:45.852303 systemd[1]: Finished disk-uuid.service. Feb 9 19:42:45.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:45.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:45.858589 systemd[1]: Starting verity-setup.service... Feb 9 19:42:45.871495 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 9 19:42:45.888702 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:42:45.891384 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:42:45.893016 systemd[1]: Finished verity-setup.service. Feb 9 19:42:45.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:45.987373 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:42:45.988448 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:42:45.988549 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:42:45.990189 systemd[1]: Starting ignition-setup.service... Feb 9 19:42:45.991956 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:42:46.002995 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:42:46.003021 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:42:46.003036 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:42:46.011783 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:42:46.046570 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:42:46.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.048000 audit: BPF prog-id=9 op=LOAD Feb 9 19:42:46.048979 systemd[1]: Starting systemd-networkd.service... Feb 9 19:42:46.069141 systemd-networkd[699]: lo: Link UP Feb 9 19:42:46.069149 systemd-networkd[699]: lo: Gained carrier Feb 9 19:42:46.069657 systemd-networkd[699]: Enumeration completed Feb 9 19:42:46.069910 systemd-networkd[699]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:42:46.069952 systemd[1]: Started systemd-networkd.service. Feb 9 19:42:46.070946 systemd-networkd[699]: eth0: Link UP Feb 9 19:42:46.070954 systemd-networkd[699]: eth0: Gained carrier Feb 9 19:42:46.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.074437 systemd[1]: Reached target network.target. Feb 9 19:42:46.088988 systemd[1]: Starting iscsiuio.service... Feb 9 19:42:46.103581 systemd[1]: Started iscsiuio.service. Feb 9 19:42:46.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.105505 systemd[1]: Starting iscsid.service... Feb 9 19:42:46.108602 iscsid[704]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:42:46.108602 iscsid[704]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:42:46.108602 iscsid[704]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:42:46.108602 iscsid[704]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:42:46.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.108600 systemd-networkd[699]: eth0: DHCPv4 address 10.0.0.48/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 19:42:46.117194 iscsid[704]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:42:46.117194 iscsid[704]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:42:46.110233 systemd[1]: Started iscsid.service. Feb 9 19:42:46.114338 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:42:46.124123 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:42:46.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.124875 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:42:46.125988 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:42:46.127352 systemd[1]: Reached target remote-fs.target. Feb 9 19:42:46.129240 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:42:46.137271 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:42:46.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.138985 systemd[1]: Finished ignition-setup.service. Feb 9 19:42:46.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.140203 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:42:46.194482 ignition[719]: Ignition 2.14.0 Feb 9 19:42:46.194493 ignition[719]: Stage: fetch-offline Feb 9 19:42:46.194565 ignition[719]: no configs at "/usr/lib/ignition/base.d" Feb 9 19:42:46.194574 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:42:46.194694 ignition[719]: parsed url from cmdline: "" Feb 9 19:42:46.194697 ignition[719]: no config URL provided Feb 9 19:42:46.194701 ignition[719]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:42:46.194707 ignition[719]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:42:46.194724 ignition[719]: op(1): [started] loading QEMU firmware config module Feb 9 19:42:46.194728 ignition[719]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 9 19:42:46.224216 ignition[719]: op(1): [finished] loading QEMU firmware config module Feb 9 19:42:46.234577 ignition[719]: parsing config with SHA512: 437e5f727c6fc43cb29089e5535b57355edf56522be4ed9619a5268385d1258ed51fd7f0ecaec4b599186d706d9805253e5c654034d7bbdbdfe909c7adee6961 Feb 9 19:42:46.252172 unknown[719]: fetched base config from "system" Feb 9 19:42:46.252191 unknown[719]: fetched user config from "qemu" Feb 9 19:42:46.252666 ignition[719]: fetch-offline: fetch-offline passed Feb 9 19:42:46.252725 ignition[719]: Ignition finished successfully Feb 9 19:42:46.254703 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:42:46.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.255959 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 19:42:46.257770 systemd[1]: Starting ignition-kargs.service... Feb 9 19:42:46.267978 ignition[728]: Ignition 2.14.0 Feb 9 19:42:46.267989 ignition[728]: Stage: kargs Feb 9 19:42:46.268104 ignition[728]: no configs at "/usr/lib/ignition/base.d" Feb 9 19:42:46.268118 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:42:46.269237 ignition[728]: kargs: kargs passed Feb 9 19:42:46.269282 ignition[728]: Ignition finished successfully Feb 9 19:42:46.271925 systemd[1]: Finished ignition-kargs.service. Feb 9 19:42:46.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.272825 systemd[1]: Starting ignition-disks.service... Feb 9 19:42:46.282625 ignition[734]: Ignition 2.14.0 Feb 9 19:42:46.282636 ignition[734]: Stage: disks Feb 9 19:42:46.282748 ignition[734]: no configs at "/usr/lib/ignition/base.d" Feb 9 19:42:46.282761 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:42:46.283909 ignition[734]: disks: disks passed Feb 9 19:42:46.283951 ignition[734]: Ignition finished successfully Feb 9 19:42:46.286323 systemd[1]: Finished ignition-disks.service. Feb 9 19:42:46.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.286993 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:42:46.287952 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:42:46.289038 systemd[1]: Reached target local-fs.target. Feb 9 19:42:46.290064 systemd[1]: Reached target sysinit.target. Feb 9 19:42:46.291047 systemd[1]: Reached target basic.target. Feb 9 19:42:46.292128 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:42:46.301231 systemd-fsck[742]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 19:42:46.514450 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:42:46.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.517096 systemd[1]: Mounting sysroot.mount... Feb 9 19:42:46.524485 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:42:46.524640 systemd[1]: Mounted sysroot.mount. Feb 9 19:42:46.525752 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:42:46.527752 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:42:46.529099 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:42:46.530255 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:42:46.530294 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:42:46.533432 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:42:46.535157 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:42:46.538997 initrd-setup-root[752]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:42:46.542537 initrd-setup-root[760]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:42:46.545218 initrd-setup-root[768]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:42:46.548253 initrd-setup-root[776]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:42:46.571636 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:42:46.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.572371 systemd[1]: Starting ignition-mount.service... Feb 9 19:42:46.574126 systemd[1]: Starting sysroot-boot.service... Feb 9 19:42:46.577896 bash[793]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 19:42:46.589295 ignition[794]: INFO : Ignition 2.14.0 Feb 9 19:42:46.589295 ignition[794]: INFO : Stage: mount Feb 9 19:42:46.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.609438 ignition[794]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 19:42:46.609438 ignition[794]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:42:46.609438 ignition[794]: INFO : mount: mount passed Feb 9 19:42:46.609438 ignition[794]: INFO : Ignition finished successfully Feb 9 19:42:46.590827 systemd[1]: Finished ignition-mount.service. Feb 9 19:42:46.613612 systemd[1]: Finished sysroot-boot.service. Feb 9 19:42:46.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:46.899328 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:42:46.906739 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (804) Feb 9 19:42:46.906767 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:42:46.906777 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:42:46.907807 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:42:46.910695 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:42:46.911947 systemd[1]: Starting ignition-files.service... Feb 9 19:42:46.928903 ignition[824]: INFO : Ignition 2.14.0 Feb 9 19:42:46.928903 ignition[824]: INFO : Stage: files Feb 9 19:42:46.930048 ignition[824]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 19:42:46.930048 ignition[824]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:42:46.931735 ignition[824]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:42:46.931735 ignition[824]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:42:46.931735 ignition[824]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:42:46.934439 ignition[824]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:42:46.934439 ignition[824]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:42:46.936132 ignition[824]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:42:46.935323 unknown[824]: wrote ssh authorized keys file for user: core Feb 9 19:42:46.938003 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:42:46.939777 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 19:42:47.218754 systemd-networkd[699]: eth0: Gained IPv6LL Feb 9 19:42:47.292735 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:42:47.477719 ignition[824]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 19:42:47.477719 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:42:47.481021 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:42:47.482398 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:42:47.759867 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:42:47.863842 ignition[824]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 19:42:47.865863 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:42:47.865863 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:42:47.865863 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:42:47.935371 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:42:48.229572 ignition[824]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 19:42:48.229572 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:42:48.236866 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:42:48.236866 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:42:48.279309 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:42:49.003304 ignition[824]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 19:42:49.005943 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:42:49.005943 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:42:49.005943 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:42:49.005943 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:42:49.005943 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:42:49.005943 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:42:49.005943 ignition[824]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Feb 9 19:42:49.005943 ignition[824]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 19:42:49.029338 ignition[824]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 9 19:42:49.029338 ignition[824]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Feb 9 19:42:49.029338 ignition[824]: INFO : files: op(10): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:42:49.029338 ignition[824]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:42:49.029338 ignition[824]: INFO : files: op(11): [started] setting preset to disabled for "coreos-metadata.service" Feb 9 19:42:49.029338 ignition[824]: INFO : files: op(11): op(12): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 19:42:49.052785 ignition[824]: INFO : files: op(11): op(12): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 9 19:42:49.054128 ignition[824]: INFO : files: op(11): [finished] setting preset to disabled for "coreos-metadata.service" Feb 9 19:42:49.054128 ignition[824]: INFO : files: op(13): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:42:49.054128 ignition[824]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:42:49.054128 ignition[824]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:42:49.054128 ignition[824]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:42:49.054128 ignition[824]: INFO : files: files passed Feb 9 19:42:49.054128 ignition[824]: INFO : Ignition finished successfully Feb 9 19:42:49.060943 systemd[1]: Finished ignition-files.service. Feb 9 19:42:49.065526 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:42:49.065551 kernel: audit: type=1130 audit(1707507769.061:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.065691 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:42:49.066937 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:42:49.067607 systemd[1]: Starting ignition-quench.service... Feb 9 19:42:49.071481 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:42:49.076700 kernel: audit: type=1130 audit(1707507769.071:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.076729 kernel: audit: type=1131 audit(1707507769.071:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.071577 systemd[1]: Finished ignition-quench.service. Feb 9 19:42:49.078185 initrd-setup-root-after-ignition[851]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 9 19:42:49.080866 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:42:49.082392 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:42:49.085851 kernel: audit: type=1130 audit(1707507769.081:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.082544 systemd[1]: Reached target ignition-complete.target. Feb 9 19:42:49.087079 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:42:49.100092 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:42:49.100171 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:42:49.106891 kernel: audit: type=1130 audit(1707507769.100:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.106914 kernel: audit: type=1131 audit(1707507769.100:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.101454 systemd[1]: Reached target initrd-fs.target. Feb 9 19:42:49.107649 systemd[1]: Reached target initrd.target. Feb 9 19:42:49.108192 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:42:49.109430 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:42:49.118977 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:42:49.122241 kernel: audit: type=1130 audit(1707507769.118:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.122295 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:42:49.132709 systemd[1]: Stopped target network.target. Feb 9 19:42:49.133841 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:42:49.134012 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:42:49.135014 systemd[1]: Stopped target timers.target. Feb 9 19:42:49.136051 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:42:49.139864 kernel: audit: type=1131 audit(1707507769.136:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.136192 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:42:49.137091 systemd[1]: Stopped target initrd.target. Feb 9 19:42:49.140527 systemd[1]: Stopped target basic.target. Feb 9 19:42:49.141907 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:42:49.142416 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:42:49.143491 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:42:49.145583 systemd[1]: Stopped target remote-fs.target. Feb 9 19:42:49.145702 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:42:49.146094 systemd[1]: Stopped target sysinit.target. Feb 9 19:42:49.146303 systemd[1]: Stopped target local-fs.target. Feb 9 19:42:49.146655 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:42:49.146847 systemd[1]: Stopped target swap.target. Feb 9 19:42:49.147071 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:42:49.154868 kernel: audit: type=1131 audit(1707507769.150:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.147191 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:42:49.151500 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:42:49.159519 kernel: audit: type=1131 audit(1707507769.155:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.155517 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:42:49.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.155625 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:42:49.156152 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:42:49.156268 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:42:49.160322 systemd[1]: Stopped target paths.target. Feb 9 19:42:49.161395 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:42:49.165564 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:42:49.166337 systemd[1]: Stopped target slices.target. Feb 9 19:42:49.167448 systemd[1]: Stopped target sockets.target. Feb 9 19:42:49.167980 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:42:49.168055 systemd[1]: Closed iscsid.socket. Feb 9 19:42:49.169355 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:42:49.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.169421 systemd[1]: Closed iscsiuio.socket. Feb 9 19:42:49.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.170427 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:42:49.170554 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:42:49.171545 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:42:49.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.171636 systemd[1]: Stopped ignition-files.service. Feb 9 19:42:49.173617 systemd[1]: Stopping ignition-mount.service... Feb 9 19:42:49.174361 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:42:49.174490 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:42:49.176348 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:42:49.179682 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:42:49.180938 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:42:49.182079 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:42:49.182925 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:42:49.184177 ignition[866]: INFO : Ignition 2.14.0 Feb 9 19:42:49.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.185535 ignition[866]: INFO : Stage: umount Feb 9 19:42:49.185535 ignition[866]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 9 19:42:49.185535 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 9 19:42:49.185535 ignition[866]: INFO : umount: umount passed Feb 9 19:42:49.185535 ignition[866]: INFO : Ignition finished successfully Feb 9 19:42:49.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.184222 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:42:49.184305 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:42:49.192046 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:42:49.193285 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:42:49.193993 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:42:49.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.195587 systemd-networkd[699]: eth0: DHCPv6 lease lost Feb 9 19:42:49.196519 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:42:49.197232 systemd[1]: Stopped ignition-mount.service. Feb 9 19:42:49.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.198747 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:42:49.199575 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:42:49.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.201559 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:42:49.201630 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:42:49.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.203000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:42:49.203670 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:42:49.204348 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:42:49.204000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:42:49.205505 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:42:49.205539 systemd[1]: Stopped ignition-disks.service. Feb 9 19:42:49.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.207233 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:42:49.208001 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:42:49.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.209207 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:42:49.209243 systemd[1]: Stopped ignition-setup.service. Feb 9 19:42:49.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.211012 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:42:49.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.211044 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:42:49.213452 systemd[1]: Stopping network-cleanup.service... Feb 9 19:42:49.214468 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:42:49.214550 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:42:49.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.216527 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:42:49.216566 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:42:49.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.218482 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:42:49.219231 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:42:49.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.220651 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:42:49.223469 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:42:49.224207 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:42:49.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.225177 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:42:49.228227 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:42:49.228997 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:42:49.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.230718 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:42:49.230792 systemd[1]: Stopped network-cleanup.service. Feb 9 19:42:49.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.233406 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:42:49.233457 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:42:49.235615 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:42:49.235646 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:42:49.237632 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:42:49.237673 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:42:49.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.239646 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:42:49.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.239688 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:42:49.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.240905 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:42:49.240940 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:42:49.243780 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:42:49.245053 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:42:49.245113 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:42:49.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.249748 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:42:49.249827 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:42:49.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:49.251840 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:42:49.253634 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:42:49.270411 systemd[1]: Switching root. Feb 9 19:42:49.287161 iscsid[704]: iscsid shutting down. Feb 9 19:42:49.287824 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). Feb 9 19:42:49.287878 systemd-journald[197]: Journal stopped Feb 9 19:42:53.459927 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:42:53.459974 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:42:53.459985 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:42:53.459995 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:42:53.460005 kernel: SELinux: policy capability open_perms=1 Feb 9 19:42:53.460024 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:42:53.460037 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:42:53.460047 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:42:53.460056 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:42:53.460069 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:42:53.460078 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:42:53.460089 systemd[1]: Successfully loaded SELinux policy in 39.296ms. Feb 9 19:42:53.460104 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.158ms. Feb 9 19:42:53.460116 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:42:53.460131 systemd[1]: Detected virtualization kvm. Feb 9 19:42:53.460141 systemd[1]: Detected architecture x86-64. Feb 9 19:42:53.460155 systemd[1]: Detected first boot. Feb 9 19:42:53.460169 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:42:53.460183 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:42:53.460193 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:42:53.460204 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:42:53.460215 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:42:53.460227 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:42:53.460238 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:42:53.460248 systemd[1]: Stopped iscsiuio.service. Feb 9 19:42:53.460258 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:42:53.460273 systemd[1]: Stopped iscsid.service. Feb 9 19:42:53.460283 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:42:53.460293 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:42:53.460303 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:42:53.460314 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:42:53.460324 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:42:53.460334 systemd[1]: Created slice system-getty.slice. Feb 9 19:42:53.460350 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:42:53.460366 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:42:53.460380 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:42:53.460390 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:42:53.460400 systemd[1]: Created slice user.slice. Feb 9 19:42:53.460411 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:42:53.460422 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:42:53.460432 systemd[1]: Set up automount boot.automount. Feb 9 19:42:53.460442 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:42:53.460452 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:42:53.460466 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:42:53.460491 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:42:53.460502 systemd[1]: Reached target integritysetup.target. Feb 9 19:42:53.460512 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:42:53.460522 systemd[1]: Reached target remote-fs.target. Feb 9 19:42:53.460533 systemd[1]: Reached target slices.target. Feb 9 19:42:53.460543 systemd[1]: Reached target swap.target. Feb 9 19:42:53.460552 systemd[1]: Reached target torcx.target. Feb 9 19:42:53.460563 systemd[1]: Reached target veritysetup.target. Feb 9 19:42:53.460577 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:42:53.460587 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:42:53.460597 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:42:53.460607 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:42:53.460617 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:42:53.460628 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:42:53.460637 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:42:53.460650 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:42:53.460660 systemd[1]: Mounting media.mount... Feb 9 19:42:53.460671 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:42:53.460685 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:42:53.460695 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:42:53.460705 systemd[1]: Mounting tmp.mount... Feb 9 19:42:53.460715 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:42:53.460725 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:42:53.460735 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:42:53.460745 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:42:53.460755 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:42:53.460766 systemd[1]: Starting modprobe@drm.service... Feb 9 19:42:53.460780 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:42:53.460790 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:42:53.460800 systemd[1]: Starting modprobe@loop.service... Feb 9 19:42:53.460813 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:42:53.460827 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:42:53.460841 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:42:53.460851 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:42:53.460861 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:42:53.460876 kernel: loop: module loaded Feb 9 19:42:53.460886 kernel: fuse: init (API version 7.34) Feb 9 19:42:53.460896 systemd[1]: Stopped systemd-journald.service. Feb 9 19:42:53.460907 systemd[1]: Starting systemd-journald.service... Feb 9 19:42:53.460917 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:42:53.460927 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:42:53.460937 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:42:53.460947 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:42:53.460960 systemd-journald[985]: Journal started Feb 9 19:42:53.461004 systemd-journald[985]: Runtime Journal (/run/log/journal/7a1fe77b391242c88cc6f0493febfcaf) is 6.0M, max 48.4M, 42.4M free. Feb 9 19:42:49.346000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:42:50.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:42:50.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:42:50.477000 audit: BPF prog-id=10 op=LOAD Feb 9 19:42:50.477000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:42:50.477000 audit: BPF prog-id=11 op=LOAD Feb 9 19:42:50.477000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:42:50.514000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:42:50.514000 audit[899]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:50.514000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:42:50.515000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:42:50.515000 audit[899]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155989 a2=1ed a3=0 items=2 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:50.515000 audit: CWD cwd="/" Feb 9 19:42:50.515000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:50.515000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:50.515000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:42:53.323000 audit: BPF prog-id=12 op=LOAD Feb 9 19:42:53.323000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:42:53.323000 audit: BPF prog-id=13 op=LOAD Feb 9 19:42:53.323000 audit: BPF prog-id=14 op=LOAD Feb 9 19:42:53.323000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:42:53.323000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:42:53.324000 audit: BPF prog-id=15 op=LOAD Feb 9 19:42:53.324000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:42:53.324000 audit: BPF prog-id=16 op=LOAD Feb 9 19:42:53.324000 audit: BPF prog-id=17 op=LOAD Feb 9 19:42:53.324000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:42:53.324000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:42:53.325000 audit: BPF prog-id=18 op=LOAD Feb 9 19:42:53.325000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:42:53.325000 audit: BPF prog-id=19 op=LOAD Feb 9 19:42:53.325000 audit: BPF prog-id=20 op=LOAD Feb 9 19:42:53.325000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:42:53.325000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:42:53.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.337000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:42:53.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.443000 audit: BPF prog-id=21 op=LOAD Feb 9 19:42:53.443000 audit: BPF prog-id=22 op=LOAD Feb 9 19:42:53.443000 audit: BPF prog-id=23 op=LOAD Feb 9 19:42:53.443000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:42:53.443000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:42:53.457000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:42:53.457000 audit[985]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd2946e870 a2=4000 a3=7ffd2946e90c items=0 ppid=1 pid=985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:53.457000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:42:50.512733 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:42:53.322141 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:42:50.512990 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:42:53.322152 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 19:42:50.513057 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:42:53.326640 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:42:50.513105 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:42:50.513118 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:42:50.513158 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:42:50.513175 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:42:50.513468 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:42:50.513548 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:42:50.513568 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:42:50.513939 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:42:50.513984 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:42:50.514007 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:42:50.514029 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:42:50.514052 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:42:50.514070 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:50Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:42:52.979815 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:52Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:42:52.980084 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:52Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:42:52.980205 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:52Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:42:52.980389 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:52Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:42:52.980434 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:52Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:42:52.980512 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-02-09T19:42:52Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:42:53.466662 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:42:53.466684 systemd[1]: Stopped verity-setup.service. Feb 9 19:42:53.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.469490 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:42:53.472508 systemd[1]: Started systemd-journald.service. Feb 9 19:42:53.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.473167 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:42:53.474033 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:42:53.474816 systemd[1]: Mounted media.mount. Feb 9 19:42:53.475550 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:42:53.476353 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:42:53.477195 systemd[1]: Mounted tmp.mount. Feb 9 19:42:53.478106 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:42:53.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.479144 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:42:53.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.480149 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:42:53.480335 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:42:53.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.481424 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:42:53.481582 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:42:53.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.482599 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:42:53.482756 systemd[1]: Finished modprobe@drm.service. Feb 9 19:42:53.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.483824 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:42:53.483992 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:42:53.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.485232 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:42:53.485401 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:42:53.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.486366 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:42:53.486544 systemd[1]: Finished modprobe@loop.service. Feb 9 19:42:53.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.487614 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:42:53.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.488792 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:42:53.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.489910 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:42:53.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.491224 systemd[1]: Reached target network-pre.target. Feb 9 19:42:53.493488 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:42:53.495760 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:42:53.496467 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:42:53.498816 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:42:53.500799 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:42:53.501712 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:42:53.502885 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:42:53.507600 systemd-journald[985]: Time spent on flushing to /var/log/journal/7a1fe77b391242c88cc6f0493febfcaf is 14.890ms for 1169 entries. Feb 9 19:42:53.507600 systemd-journald[985]: System Journal (/var/log/journal/7a1fe77b391242c88cc6f0493febfcaf) is 8.0M, max 195.6M, 187.6M free. Feb 9 19:42:53.740558 systemd-journald[985]: Received client request to flush runtime journal. Feb 9 19:42:53.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:53.503786 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:42:53.504857 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:42:53.507744 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:42:53.741435 udevadm[1003]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:42:53.512887 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:42:53.513807 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:42:53.519870 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:42:53.522122 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:42:53.554922 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:42:53.558524 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:42:53.627856 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:42:53.628743 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:42:53.741759 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:42:53.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.423192 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:42:54.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.424533 kernel: kauditd_printk_skb: 105 callbacks suppressed Feb 9 19:42:54.424593 kernel: audit: type=1130 audit(1707507774.423:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.424000 audit: BPF prog-id=24 op=LOAD Feb 9 19:42:54.427238 systemd[1]: Starting systemd-udevd.service... Feb 9 19:42:54.426000 audit: BPF prog-id=25 op=LOAD Feb 9 19:42:54.426000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:42:54.426000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:42:54.427502 kernel: audit: type=1334 audit(1707507774.424:141): prog-id=24 op=LOAD Feb 9 19:42:54.427529 kernel: audit: type=1334 audit(1707507774.426:142): prog-id=25 op=LOAD Feb 9 19:42:54.427551 kernel: audit: type=1334 audit(1707507774.426:143): prog-id=7 op=UNLOAD Feb 9 19:42:54.427566 kernel: audit: type=1334 audit(1707507774.426:144): prog-id=8 op=UNLOAD Feb 9 19:42:54.443326 systemd-udevd[1006]: Using default interface naming scheme 'v252'. Feb 9 19:42:54.455175 systemd[1]: Started systemd-udevd.service. Feb 9 19:42:54.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.477493 kernel: audit: type=1130 audit(1707507774.474:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.476000 audit: BPF prog-id=26 op=LOAD Feb 9 19:42:54.478302 systemd[1]: Starting systemd-networkd.service... Feb 9 19:42:54.479491 kernel: audit: type=1334 audit(1707507774.476:146): prog-id=26 op=LOAD Feb 9 19:42:54.481000 audit: BPF prog-id=27 op=LOAD Feb 9 19:42:54.482000 audit: BPF prog-id=28 op=LOAD Feb 9 19:42:54.483678 kernel: audit: type=1334 audit(1707507774.481:147): prog-id=27 op=LOAD Feb 9 19:42:54.483729 kernel: audit: type=1334 audit(1707507774.482:148): prog-id=28 op=LOAD Feb 9 19:42:54.483749 kernel: audit: type=1334 audit(1707507774.483:149): prog-id=29 op=LOAD Feb 9 19:42:54.483000 audit: BPF prog-id=29 op=LOAD Feb 9 19:42:54.484180 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:42:54.509902 systemd[1]: Started systemd-userdbd.service. Feb 9 19:42:54.512771 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:42:54.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.523534 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:42:54.544525 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:42:54.550677 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:42:54.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.553207 systemd-networkd[1016]: lo: Link UP Feb 9 19:42:54.553214 systemd-networkd[1016]: lo: Gained carrier Feb 9 19:42:54.553609 systemd-networkd[1016]: Enumeration completed Feb 9 19:42:54.553706 systemd[1]: Started systemd-networkd.service. Feb 9 19:42:54.554407 systemd-networkd[1016]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:42:54.556225 systemd-networkd[1016]: eth0: Link UP Feb 9 19:42:54.556231 systemd-networkd[1016]: eth0: Gained carrier Feb 9 19:42:54.565000 audit[1010]: AVC avc: denied { confidentiality } for pid=1010 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:42:54.568725 systemd-networkd[1016]: eth0: DHCPv4 address 10.0.0.48/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 9 19:42:54.565000 audit[1010]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a74abb1a30 a1=32194 a2=7f534b474bc5 a3=5 items=108 ppid=1006 pid=1010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:54.565000 audit: CWD cwd="/" Feb 9 19:42:54.565000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=1 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=2 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=3 name=(null) inode=14512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=4 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=5 name=(null) inode=14513 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=6 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=7 name=(null) inode=14514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=8 name=(null) inode=14514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=9 name=(null) inode=14515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=10 name=(null) inode=14514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=11 name=(null) inode=14516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=12 name=(null) inode=14514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=13 name=(null) inode=14517 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=14 name=(null) inode=14514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=15 name=(null) inode=14518 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=16 name=(null) inode=14514 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=17 name=(null) inode=14519 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=18 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=19 name=(null) inode=14520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=20 name=(null) inode=14520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=21 name=(null) inode=14521 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=22 name=(null) inode=14520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=23 name=(null) inode=14522 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=24 name=(null) inode=14520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=25 name=(null) inode=14523 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=26 name=(null) inode=14520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=27 name=(null) inode=14524 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=28 name=(null) inode=14520 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=29 name=(null) inode=14525 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=30 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=31 name=(null) inode=14526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=32 name=(null) inode=14526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=33 name=(null) inode=14527 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=34 name=(null) inode=14526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=35 name=(null) inode=14528 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=36 name=(null) inode=14526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=37 name=(null) inode=14529 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=38 name=(null) inode=14526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=39 name=(null) inode=14530 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=40 name=(null) inode=14526 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=41 name=(null) inode=14531 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=42 name=(null) inode=14511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=43 name=(null) inode=14532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=44 name=(null) inode=14532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=45 name=(null) inode=14533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=46 name=(null) inode=14532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=47 name=(null) inode=14534 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=48 name=(null) inode=14532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=49 name=(null) inode=14535 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=50 name=(null) inode=14532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=51 name=(null) inode=14536 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=52 name=(null) inode=14532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=53 name=(null) inode=14537 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=55 name=(null) inode=14538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=56 name=(null) inode=14538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=57 name=(null) inode=14539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=58 name=(null) inode=14538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=59 name=(null) inode=14540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=60 name=(null) inode=14538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=61 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=62 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=63 name=(null) inode=14542 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=64 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=65 name=(null) inode=14543 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=66 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=67 name=(null) inode=14544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=68 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=69 name=(null) inode=14545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=70 name=(null) inode=14541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=71 name=(null) inode=14546 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=72 name=(null) inode=14538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=73 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=74 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=75 name=(null) inode=14548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=76 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=77 name=(null) inode=14549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=78 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=79 name=(null) inode=14550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=80 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=81 name=(null) inode=14551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=82 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=83 name=(null) inode=14552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=84 name=(null) inode=14538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=85 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=86 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=87 name=(null) inode=14554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=88 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=89 name=(null) inode=14555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=90 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=91 name=(null) inode=14556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=92 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=93 name=(null) inode=14557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=94 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=95 name=(null) inode=14558 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=96 name=(null) inode=14538 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=97 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=98 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=99 name=(null) inode=14560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=100 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=101 name=(null) inode=14561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=102 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=103 name=(null) inode=14562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=104 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=105 name=(null) inode=14563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=106 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PATH item=107 name=(null) inode=14564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:54.565000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:42:54.609534 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 19:42:54.611495 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:42:54.613499 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Feb 9 19:42:54.659839 kernel: kvm: Nested Virtualization enabled Feb 9 19:42:54.659972 kernel: SVM: kvm: Nested Paging enabled Feb 9 19:42:54.659990 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 9 19:42:54.660003 kernel: SVM: Virtual GIF supported Feb 9 19:42:54.674505 kernel: EDAC MC: Ver: 3.0.0 Feb 9 19:42:54.692870 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:42:54.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.694827 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:42:54.702070 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:42:54.733590 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:42:54.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.735364 systemd[1]: Reached target cryptsetup.target. Feb 9 19:42:54.737061 systemd[1]: Starting lvm2-activation.service... Feb 9 19:42:54.740803 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:42:54.768502 systemd[1]: Finished lvm2-activation.service. Feb 9 19:42:54.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.769324 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:42:54.770044 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:42:54.770069 systemd[1]: Reached target local-fs.target. Feb 9 19:42:54.770750 systemd[1]: Reached target machines.target. Feb 9 19:42:54.772665 systemd[1]: Starting ldconfig.service... Feb 9 19:42:54.773624 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:42:54.773711 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:42:54.774815 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:42:54.776789 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:42:54.787447 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:42:54.788854 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:42:54.788925 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:42:54.790159 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:42:54.791291 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Feb 9 19:42:54.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.792885 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:42:54.796555 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:42:54.812778 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:42:54.815893 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:42:54.819584 systemd-tmpfiles[1050]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:42:54.834931 systemd-fsck[1054]: fsck.fat 4.2 (2021-01-31) Feb 9 19:42:54.834931 systemd-fsck[1054]: /dev/vda1: 790 files, 115362/258078 clusters Feb 9 19:42:54.848343 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:42:54.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:54.850639 systemd[1]: Mounting boot.mount... Feb 9 19:42:55.332584 systemd[1]: Mounted boot.mount. Feb 9 19:42:55.346591 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:42:55.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:55.364243 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:42:55.364960 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:42:55.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:55.406070 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:42:55.412662 systemd[1]: Finished ldconfig.service. Feb 9 19:42:55.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:55.413920 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:42:55.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:55.416559 systemd[1]: Starting audit-rules.service... Feb 9 19:42:55.420082 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:42:55.421905 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:42:55.423000 audit: BPF prog-id=30 op=LOAD Feb 9 19:42:55.426000 audit: BPF prog-id=31 op=LOAD Feb 9 19:42:55.425244 systemd[1]: Starting systemd-resolved.service... Feb 9 19:42:55.428316 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:42:55.433000 audit[1068]: SYSTEM_BOOT pid=1068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:42:55.431508 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:42:55.448667 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:42:55.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:55.452553 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:42:55.454685 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:42:55.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:55.469196 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:42:55.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:55.471746 systemd[1]: Starting systemd-update-done.service... Feb 9 19:42:55.472000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:42:55.472000 audit[1077]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb63b5b30 a2=420 a3=0 items=0 ppid=1057 pid=1077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:55.472000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:42:55.472939 augenrules[1077]: No rules Feb 9 19:42:55.473484 systemd[1]: Finished audit-rules.service. Feb 9 19:42:55.481284 systemd[1]: Finished systemd-update-done.service. Feb 9 19:42:55.514734 systemd-resolved[1066]: Positive Trust Anchors: Feb 9 19:42:55.514756 systemd-resolved[1066]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:42:55.514793 systemd-resolved[1066]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:42:55.517603 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:42:55.518489 systemd[1]: Reached target time-set.target. Feb 9 19:42:55.965467 systemd-timesyncd[1067]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 9 19:42:55.965508 systemd-timesyncd[1067]: Initial clock synchronization to Fri 2024-02-09 19:42:55.965371 UTC. Feb 9 19:42:55.969494 systemd-resolved[1066]: Defaulting to hostname 'linux'. Feb 9 19:42:55.971035 systemd[1]: Started systemd-resolved.service. Feb 9 19:42:55.971720 systemd[1]: Reached target network.target. Feb 9 19:42:55.972307 systemd[1]: Reached target nss-lookup.target. Feb 9 19:42:55.972890 systemd[1]: Reached target sysinit.target. Feb 9 19:42:55.973551 systemd[1]: Started motdgen.path. Feb 9 19:42:55.974095 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:42:55.975033 systemd[1]: Started logrotate.timer. Feb 9 19:42:55.975613 systemd[1]: Started mdadm.timer. Feb 9 19:42:55.976132 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:42:55.976744 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:42:55.976774 systemd[1]: Reached target paths.target. Feb 9 19:42:55.977325 systemd[1]: Reached target timers.target. Feb 9 19:42:55.978213 systemd[1]: Listening on dbus.socket. Feb 9 19:42:55.979752 systemd[1]: Starting docker.socket... Feb 9 19:42:55.982375 systemd[1]: Listening on sshd.socket. Feb 9 19:42:55.983014 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:42:55.983408 systemd[1]: Listening on docker.socket. Feb 9 19:42:55.984026 systemd[1]: Reached target sockets.target. Feb 9 19:42:55.984594 systemd[1]: Reached target basic.target. Feb 9 19:42:55.985200 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:42:55.985217 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:42:55.986162 systemd[1]: Starting containerd.service... Feb 9 19:42:55.987768 systemd[1]: Starting dbus.service... Feb 9 19:42:55.989468 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:42:55.991313 systemd[1]: Starting extend-filesystems.service... Feb 9 19:42:55.992044 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:42:55.993593 systemd[1]: Starting motdgen.service... Feb 9 19:42:55.995590 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:42:55.998769 jq[1088]: false Feb 9 19:42:55.998588 systemd[1]: Starting prepare-critools.service... Feb 9 19:42:56.000720 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:42:56.002626 systemd[1]: Starting sshd-keygen.service... Feb 9 19:42:56.007245 dbus-daemon[1087]: [system] SELinux support is enabled Feb 9 19:42:56.006038 systemd[1]: Starting systemd-logind.service... Feb 9 19:42:56.006811 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:42:56.006933 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:42:56.007527 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:42:56.008518 systemd[1]: Starting update-engine.service... Feb 9 19:42:56.010413 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:42:56.012274 systemd[1]: Started dbus.service. Feb 9 19:42:56.014128 jq[1106]: true Feb 9 19:42:56.016377 extend-filesystems[1089]: Found sr0 Feb 9 19:42:56.016770 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:42:56.016976 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:42:56.017695 extend-filesystems[1089]: Found vda Feb 9 19:42:56.017695 extend-filesystems[1089]: Found vda1 Feb 9 19:42:56.017695 extend-filesystems[1089]: Found vda2 Feb 9 19:42:56.017695 extend-filesystems[1089]: Found vda3 Feb 9 19:42:56.017695 extend-filesystems[1089]: Found usr Feb 9 19:42:56.019654 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:42:56.036455 extend-filesystems[1089]: Found vda4 Feb 9 19:42:56.036455 extend-filesystems[1089]: Found vda6 Feb 9 19:42:56.036455 extend-filesystems[1089]: Found vda7 Feb 9 19:42:56.036455 extend-filesystems[1089]: Found vda9 Feb 9 19:42:56.036455 extend-filesystems[1089]: Checking size of /dev/vda9 Feb 9 19:42:56.050935 tar[1110]: ./ Feb 9 19:42:56.050935 tar[1110]: ./macvlan Feb 9 19:42:56.019855 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:42:56.053300 tar[1111]: crictl Feb 9 19:42:56.022833 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:42:56.053645 jq[1112]: true Feb 9 19:42:56.022872 systemd[1]: Reached target system-config.target. Feb 9 19:42:56.022996 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:42:56.023019 systemd[1]: Reached target user-config.target. Feb 9 19:42:56.038379 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:42:56.038573 systemd[1]: Finished motdgen.service. Feb 9 19:42:56.057526 extend-filesystems[1089]: Resized partition /dev/vda9 Feb 9 19:42:56.066902 update_engine[1105]: I0209 19:42:56.066712 1105 main.cc:92] Flatcar Update Engine starting Feb 9 19:42:56.068146 extend-filesystems[1140]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:42:56.074816 systemd[1]: Started update-engine.service. Feb 9 19:42:56.075315 update_engine[1105]: I0209 19:42:56.074889 1105 update_check_scheduler.cc:74] Next update check in 8m8s Feb 9 19:42:56.076313 tar[1110]: ./static Feb 9 19:42:56.077632 systemd[1]: Started locksmithd.service. Feb 9 19:42:56.091083 env[1115]: time="2024-02-09T19:42:56.091017138Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:42:56.102870 tar[1110]: ./vlan Feb 9 19:42:56.120761 env[1115]: time="2024-02-09T19:42:56.120694333Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:42:56.121156 env[1115]: time="2024-02-09T19:42:56.121134779Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:42:56.124324 env[1115]: time="2024-02-09T19:42:56.124147849Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:42:56.124324 env[1115]: time="2024-02-09T19:42:56.124189126Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:42:56.124610 env[1115]: time="2024-02-09T19:42:56.124566233Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:42:56.124610 env[1115]: time="2024-02-09T19:42:56.124589958Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:42:56.124898 env[1115]: time="2024-02-09T19:42:56.124689304Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:42:56.124898 env[1115]: time="2024-02-09T19:42:56.124709381Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:42:56.124898 env[1115]: time="2024-02-09T19:42:56.124783911Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:42:56.125238 env[1115]: time="2024-02-09T19:42:56.125139999Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:42:56.125515 env[1115]: time="2024-02-09T19:42:56.125328011Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:42:56.125515 env[1115]: time="2024-02-09T19:42:56.125350413Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:42:56.125515 env[1115]: time="2024-02-09T19:42:56.125400527Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:42:56.125515 env[1115]: time="2024-02-09T19:42:56.125411638Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:42:56.136083 tar[1110]: ./portmap Feb 9 19:42:56.170564 tar[1110]: ./host-local Feb 9 19:42:56.190901 systemd-logind[1100]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:42:56.191233 systemd-logind[1100]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:42:56.191828 systemd-logind[1100]: New seat seat0. Feb 9 19:42:56.196689 systemd[1]: Started systemd-logind.service. Feb 9 19:42:56.209134 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 9 19:42:56.212713 tar[1110]: ./vrf Feb 9 19:42:56.264505 tar[1110]: ./bridge Feb 9 19:42:56.297442 tar[1110]: ./tuning Feb 9 19:42:56.306238 systemd-networkd[1016]: eth0: Gained IPv6LL Feb 9 19:42:56.331420 tar[1110]: ./firewall Feb 9 19:42:56.400147 tar[1110]: ./host-device Feb 9 19:42:56.402997 locksmithd[1142]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:42:56.442213 tar[1110]: ./sbr Feb 9 19:42:56.479613 tar[1110]: ./loopback Feb 9 19:42:56.510498 tar[1110]: ./dhcp Feb 9 19:42:56.594703 tar[1110]: ./ptp Feb 9 19:42:56.683148 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 9 19:42:56.817724 bash[1137]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:42:56.818521 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:42:57.351471 extend-filesystems[1140]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 19:42:57.351471 extend-filesystems[1140]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 9 19:42:57.351471 extend-filesystems[1140]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 9 19:42:57.354616 extend-filesystems[1089]: Resized filesystem in /dev/vda9 Feb 9 19:42:57.351837 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:42:57.352018 systemd[1]: Finished extend-filesystems.service. Feb 9 19:42:57.359779 tar[1110]: ./ipvlan Feb 9 19:42:57.412727 sshd_keygen[1108]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:42:57.422016 tar[1110]: ./bandwidth Feb 9 19:42:57.433401 systemd[1]: Finished prepare-critools.service. Feb 9 19:42:57.435058 systemd[1]: Finished sshd-keygen.service. Feb 9 19:42:57.437170 systemd[1]: Starting issuegen.service... Feb 9 19:42:57.441919 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:42:57.442046 systemd[1]: Finished issuegen.service. Feb 9 19:42:57.443779 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:42:57.449966 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:42:57.451767 systemd[1]: Started getty@tty1.service. Feb 9 19:42:57.453378 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:42:57.454180 systemd[1]: Reached target getty.target. Feb 9 19:42:57.462452 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:42:57.490062 env[1115]: time="2024-02-09T19:42:57.489990153Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:42:57.490062 env[1115]: time="2024-02-09T19:42:57.490059703Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490075002Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490163357Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490183044Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490200647Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490213341Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490226536Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490239630Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490257474Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490269797Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490458 env[1115]: time="2024-02-09T19:42:57.490287670Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:42:57.490699 env[1115]: time="2024-02-09T19:42:57.490499197Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:42:57.490699 env[1115]: time="2024-02-09T19:42:57.490574408Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:42:57.490943 env[1115]: time="2024-02-09T19:42:57.490884770Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:42:57.490988 env[1115]: time="2024-02-09T19:42:57.490956695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.490988 env[1115]: time="2024-02-09T19:42:57.490971623Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:42:57.491045 env[1115]: time="2024-02-09T19:42:57.491031565Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491081 env[1115]: time="2024-02-09T19:42:57.491046994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491081 env[1115]: time="2024-02-09T19:42:57.491059528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491081 env[1115]: time="2024-02-09T19:42:57.491072322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491165 env[1115]: time="2024-02-09T19:42:57.491122456Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491165 env[1115]: time="2024-02-09T19:42:57.491137774Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491165 env[1115]: time="2024-02-09T19:42:57.491151189Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491165 env[1115]: time="2024-02-09T19:42:57.491161799Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491249 env[1115]: time="2024-02-09T19:42:57.491175285Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:42:57.491364 env[1115]: time="2024-02-09T19:42:57.491340154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491391 env[1115]: time="2024-02-09T19:42:57.491367425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491391 env[1115]: time="2024-02-09T19:42:57.491380249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491435 env[1115]: time="2024-02-09T19:42:57.491390929Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:42:57.491435 env[1115]: time="2024-02-09T19:42:57.491408692Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:42:57.491435 env[1115]: time="2024-02-09T19:42:57.491419783Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:42:57.491493 env[1115]: time="2024-02-09T19:42:57.491441674Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:42:57.491493 env[1115]: time="2024-02-09T19:42:57.491476700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:42:57.491717 env[1115]: time="2024-02-09T19:42:57.491663891Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:42:57.492264 env[1115]: time="2024-02-09T19:42:57.491725837Z" level=info msg="Connect containerd service" Feb 9 19:42:57.492264 env[1115]: time="2024-02-09T19:42:57.491767335Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:42:57.492264 env[1115]: time="2024-02-09T19:42:57.492240151Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:42:57.492426 env[1115]: time="2024-02-09T19:42:57.492380024Z" level=info msg="Start subscribing containerd event" Feb 9 19:42:57.492464 env[1115]: time="2024-02-09T19:42:57.492451007Z" level=info msg="Start recovering state" Feb 9 19:42:57.492503 env[1115]: time="2024-02-09T19:42:57.492492795Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:42:57.492528 env[1115]: time="2024-02-09T19:42:57.492519966Z" level=info msg="Start event monitor" Feb 9 19:42:57.492550 env[1115]: time="2024-02-09T19:42:57.492532540Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:42:57.492550 env[1115]: time="2024-02-09T19:42:57.492539523Z" level=info msg="Start snapshots syncer" Feb 9 19:42:57.492591 env[1115]: time="2024-02-09T19:42:57.492550674Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:42:57.492591 env[1115]: time="2024-02-09T19:42:57.492558709Z" level=info msg="Start streaming server" Feb 9 19:42:57.492668 systemd[1]: Started containerd.service. Feb 9 19:42:57.493228 env[1115]: time="2024-02-09T19:42:57.492765246Z" level=info msg="containerd successfully booted in 1.402723s" Feb 9 19:42:57.493521 systemd[1]: Reached target multi-user.target. Feb 9 19:42:57.495267 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:42:57.502161 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:42:57.502321 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:42:57.503143 systemd[1]: Startup finished in 703ms (kernel) + 5.542s (initrd) + 7.750s (userspace) = 13.997s. Feb 9 19:42:58.590314 systemd[1]: Created slice system-sshd.slice. Feb 9 19:42:58.591459 systemd[1]: Started sshd@0-10.0.0.48:22-10.0.0.1:51862.service. Feb 9 19:42:58.624211 sshd[1173]: Accepted publickey for core from 10.0.0.1 port 51862 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:58.625553 sshd[1173]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:58.633655 systemd-logind[1100]: New session 1 of user core. Feb 9 19:42:58.634568 systemd[1]: Created slice user-500.slice. Feb 9 19:42:58.635668 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:42:58.643568 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:42:58.645213 systemd[1]: Starting user@500.service... Feb 9 19:42:58.647613 (systemd)[1176]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:58.711916 systemd[1176]: Queued start job for default target default.target. Feb 9 19:42:58.712350 systemd[1176]: Reached target paths.target. Feb 9 19:42:58.712368 systemd[1176]: Reached target sockets.target. Feb 9 19:42:58.712379 systemd[1176]: Reached target timers.target. Feb 9 19:42:58.712389 systemd[1176]: Reached target basic.target. Feb 9 19:42:58.712424 systemd[1176]: Reached target default.target. Feb 9 19:42:58.712444 systemd[1176]: Startup finished in 59ms. Feb 9 19:42:58.712511 systemd[1]: Started user@500.service. Feb 9 19:42:58.713462 systemd[1]: Started session-1.scope. Feb 9 19:42:58.764074 systemd[1]: Started sshd@1-10.0.0.48:22-10.0.0.1:51876.service. Feb 9 19:42:58.793358 sshd[1185]: Accepted publickey for core from 10.0.0.1 port 51876 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:58.794328 sshd[1185]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:58.797705 systemd-logind[1100]: New session 2 of user core. Feb 9 19:42:58.798532 systemd[1]: Started session-2.scope. Feb 9 19:42:58.850790 sshd[1185]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:58.853263 systemd[1]: sshd@1-10.0.0.48:22-10.0.0.1:51876.service: Deactivated successfully. Feb 9 19:42:58.853722 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:42:58.854136 systemd-logind[1100]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:42:58.855190 systemd[1]: Started sshd@2-10.0.0.48:22-10.0.0.1:51878.service. Feb 9 19:42:58.855819 systemd-logind[1100]: Removed session 2. Feb 9 19:42:58.884355 sshd[1191]: Accepted publickey for core from 10.0.0.1 port 51878 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:58.885293 sshd[1191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:58.888230 systemd-logind[1100]: New session 3 of user core. Feb 9 19:42:58.889088 systemd[1]: Started session-3.scope. Feb 9 19:42:58.939346 sshd[1191]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:58.941798 systemd[1]: sshd@2-10.0.0.48:22-10.0.0.1:51878.service: Deactivated successfully. Feb 9 19:42:58.942278 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:42:58.942691 systemd-logind[1100]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:42:58.943637 systemd[1]: Started sshd@3-10.0.0.48:22-10.0.0.1:51892.service. Feb 9 19:42:58.944215 systemd-logind[1100]: Removed session 3. Feb 9 19:42:58.973336 sshd[1197]: Accepted publickey for core from 10.0.0.1 port 51892 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:58.974393 sshd[1197]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:58.977476 systemd-logind[1100]: New session 4 of user core. Feb 9 19:42:58.978368 systemd[1]: Started session-4.scope. Feb 9 19:42:59.030772 sshd[1197]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:59.033540 systemd[1]: sshd@3-10.0.0.48:22-10.0.0.1:51892.service: Deactivated successfully. Feb 9 19:42:59.034035 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:42:59.034490 systemd-logind[1100]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:42:59.035341 systemd[1]: Started sshd@4-10.0.0.48:22-10.0.0.1:51898.service. Feb 9 19:42:59.036087 systemd-logind[1100]: Removed session 4. Feb 9 19:42:59.065948 sshd[1203]: Accepted publickey for core from 10.0.0.1 port 51898 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:59.067282 sshd[1203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:59.070441 systemd-logind[1100]: New session 5 of user core. Feb 9 19:42:59.071223 systemd[1]: Started session-5.scope. Feb 9 19:42:59.127357 sudo[1206]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:42:59.127524 sudo[1206]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:42:59.136392 dbus-daemon[1087]: \xd0}18ZU: received setenforce notice (enforcing=1779914096) Feb 9 19:42:59.138542 sudo[1206]: pam_unix(sudo:session): session closed for user root Feb 9 19:42:59.140363 sshd[1203]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:59.143795 systemd[1]: sshd@4-10.0.0.48:22-10.0.0.1:51898.service: Deactivated successfully. Feb 9 19:42:59.144467 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:42:59.145163 systemd-logind[1100]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:42:59.146491 systemd[1]: Started sshd@5-10.0.0.48:22-10.0.0.1:51900.service. Feb 9 19:42:59.147399 systemd-logind[1100]: Removed session 5. Feb 9 19:42:59.178262 sshd[1210]: Accepted publickey for core from 10.0.0.1 port 51900 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:59.179716 sshd[1210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:59.183657 systemd-logind[1100]: New session 6 of user core. Feb 9 19:42:59.184654 systemd[1]: Started session-6.scope. Feb 9 19:42:59.239610 sudo[1214]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:42:59.239836 sudo[1214]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:42:59.242905 sudo[1214]: pam_unix(sudo:session): session closed for user root Feb 9 19:42:59.247540 sudo[1213]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:42:59.247718 sudo[1213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:42:59.256986 systemd[1]: Stopping audit-rules.service... Feb 9 19:42:59.257000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:42:59.257000 audit[1217]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc51694500 a2=420 a3=0 items=0 ppid=1 pid=1217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:59.257000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:42:59.258295 auditctl[1217]: No rules Feb 9 19:42:59.258512 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:42:59.258680 systemd[1]: Stopped audit-rules.service. Feb 9 19:42:59.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.260304 systemd[1]: Starting audit-rules.service... Feb 9 19:42:59.276769 augenrules[1234]: No rules Feb 9 19:42:59.277638 systemd[1]: Finished audit-rules.service. Feb 9 19:42:59.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.278438 sudo[1213]: pam_unix(sudo:session): session closed for user root Feb 9 19:42:59.277000 audit[1213]: USER_END pid=1213 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.277000 audit[1213]: CRED_DISP pid=1213 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.279773 sshd[1210]: pam_unix(sshd:session): session closed for user core Feb 9 19:42:59.279000 audit[1210]: USER_END pid=1210 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:59.279000 audit[1210]: CRED_DISP pid=1210 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:59.282345 systemd[1]: sshd@5-10.0.0.48:22-10.0.0.1:51900.service: Deactivated successfully. Feb 9 19:42:59.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.48:22-10.0.0.1:51900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.282829 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:42:59.283352 systemd-logind[1100]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:42:59.284364 systemd[1]: Started sshd@6-10.0.0.48:22-10.0.0.1:51910.service. Feb 9 19:42:59.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.48:22-10.0.0.1:51910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.285048 systemd-logind[1100]: Removed session 6. Feb 9 19:42:59.314000 audit[1240]: USER_ACCT pid=1240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:59.315945 sshd[1240]: Accepted publickey for core from 10.0.0.1 port 51910 ssh2: RSA SHA256:6trw0do8ovoIwkWpSqWPgGsMLbX9JFOWDr7uNmRxrVo Feb 9 19:42:59.315000 audit[1240]: CRED_ACQ pid=1240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:59.315000 audit[1240]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffae06eea0 a2=3 a3=0 items=0 ppid=1 pid=1240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:59.315000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:42:59.317397 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:42:59.321102 systemd-logind[1100]: New session 7 of user core. Feb 9 19:42:59.322249 systemd[1]: Started session-7.scope. Feb 9 19:42:59.325000 audit[1240]: USER_START pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:59.326000 audit[1242]: CRED_ACQ pid=1242 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:42:59.375000 audit[1243]: USER_ACCT pid=1243 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.375000 audit[1243]: CRED_REFR pid=1243 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.376451 sudo[1243]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:42:59.376651 sudo[1243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:42:59.377000 audit[1243]: USER_START pid=1243 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:42:59.898735 systemd[1]: Reloading. Feb 9 19:42:59.960147 /usr/lib/systemd/system-generators/torcx-generator[1273]: time="2024-02-09T19:42:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:42:59.960462 /usr/lib/systemd/system-generators/torcx-generator[1273]: time="2024-02-09T19:42:59Z" level=info msg="torcx already run" Feb 9 19:43:00.021015 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:43:00.021032 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:43:00.037750 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.094238 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 9 19:43:00.094293 kernel: audit: type=1400 audit(1707507780.092:186): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.098126 kernel: audit: type=1400 audit(1707507780.092:187): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.098155 kernel: audit: type=1400 audit(1707507780.092:188): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102027 kernel: audit: type=1400 audit(1707507780.092:189): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102065 kernel: audit: type=1400 audit(1707507780.092:190): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.105936 kernel: audit: type=1400 audit(1707507780.092:191): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.105975 kernel: audit: type=1400 audit(1707507780.092:192): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.110016 kernel: audit: type=1400 audit(1707507780.092:193): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.110050 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:43:00.110066 kernel: audit: type=1400 audit(1707507780.092:194): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit: BPF prog-id=37 op=LOAD Feb 9 19:43:00.095000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit: BPF prog-id=38 op=LOAD Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.098000 audit: BPF prog-id=39 op=LOAD Feb 9 19:43:00.098000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:43:00.098000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:43:00.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit: BPF prog-id=40 op=LOAD Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.104000 audit: BPF prog-id=41 op=LOAD Feb 9 19:43:00.104000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:43:00.104000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit: BPF prog-id=42 op=LOAD Feb 9 19:43:00.106000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit: BPF prog-id=43 op=LOAD Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit: BPF prog-id=44 op=LOAD Feb 9 19:43:00.111000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:43:00.111000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit: BPF prog-id=45 op=LOAD Feb 9 19:43:00.112000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit: BPF prog-id=46 op=LOAD Feb 9 19:43:00.112000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.112000 audit: BPF prog-id=47 op=LOAD Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.113000 audit: BPF prog-id=48 op=LOAD Feb 9 19:43:00.113000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:43:00.113000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.114000 audit: BPF prog-id=49 op=LOAD Feb 9 19:43:00.114000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.115000 audit: BPF prog-id=50 op=LOAD Feb 9 19:43:00.115000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.116000 audit: BPF prog-id=51 op=LOAD Feb 9 19:43:00.116000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:43:00.124165 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:43:00.129488 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:43:00.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:00.130207 systemd[1]: Reached target network-online.target. Feb 9 19:43:00.132364 systemd[1]: Started kubelet.service. Feb 9 19:43:00.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:00.144558 systemd[1]: Starting coreos-metadata.service... Feb 9 19:43:00.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:00.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:00.151595 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 9 19:43:00.151739 systemd[1]: Finished coreos-metadata.service. Feb 9 19:43:00.192756 kubelet[1314]: E0209 19:43:00.192666 1314 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:43:00.194846 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:43:00.194972 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:43:00.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:43:00.376452 systemd[1]: Stopped kubelet.service. Feb 9 19:43:00.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:00.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:00.392060 systemd[1]: Reloading. Feb 9 19:43:00.458246 /usr/lib/systemd/system-generators/torcx-generator[1382]: time="2024-02-09T19:43:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:43:00.458661 /usr/lib/systemd/system-generators/torcx-generator[1382]: time="2024-02-09T19:43:00Z" level=info msg="torcx already run" Feb 9 19:43:00.525203 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:43:00.525220 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:43:00.542015 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit: BPF prog-id=52 op=LOAD Feb 9 19:43:00.598000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit: BPF prog-id=53 op=LOAD Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.598000 audit: BPF prog-id=54 op=LOAD Feb 9 19:43:00.598000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:43:00.598000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit: BPF prog-id=55 op=LOAD Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.599000 audit: BPF prog-id=56 op=LOAD Feb 9 19:43:00.599000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:43:00.599000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit: BPF prog-id=57 op=LOAD Feb 9 19:43:00.601000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit: BPF prog-id=58 op=LOAD Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit: BPF prog-id=59 op=LOAD Feb 9 19:43:00.601000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:43:00.601000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit: BPF prog-id=60 op=LOAD Feb 9 19:43:00.602000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit: BPF prog-id=61 op=LOAD Feb 9 19:43:00.603000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit: BPF prog-id=62 op=LOAD Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.603000 audit: BPF prog-id=63 op=LOAD Feb 9 19:43:00.603000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:43:00.603000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.605000 audit: BPF prog-id=64 op=LOAD Feb 9 19:43:00.605000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.606000 audit: BPF prog-id=65 op=LOAD Feb 9 19:43:00.606000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:00.609000 audit: BPF prog-id=66 op=LOAD Feb 9 19:43:00.609000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:43:00.622624 systemd[1]: Started kubelet.service. Feb 9 19:43:00.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:00.683956 kubelet[1424]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:43:00.683956 kubelet[1424]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:43:00.684373 kubelet[1424]: I0209 19:43:00.683985 1424 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:43:00.685943 kubelet[1424]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:43:00.685943 kubelet[1424]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:43:01.190477 kubelet[1424]: I0209 19:43:01.190415 1424 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:43:01.190477 kubelet[1424]: I0209 19:43:01.190452 1424 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:43:01.190708 kubelet[1424]: I0209 19:43:01.190691 1424 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:43:01.192443 kubelet[1424]: I0209 19:43:01.192414 1424 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:43:01.196411 kubelet[1424]: I0209 19:43:01.196389 1424 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:43:01.196596 kubelet[1424]: I0209 19:43:01.196578 1424 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:43:01.196699 kubelet[1424]: I0209 19:43:01.196683 1424 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:43:01.196801 kubelet[1424]: I0209 19:43:01.196707 1424 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:43:01.196801 kubelet[1424]: I0209 19:43:01.196728 1424 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:43:01.196862 kubelet[1424]: I0209 19:43:01.196847 1424 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:43:01.200579 kubelet[1424]: I0209 19:43:01.200563 1424 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:43:01.200647 kubelet[1424]: I0209 19:43:01.200587 1424 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:43:01.200647 kubelet[1424]: I0209 19:43:01.200616 1424 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:43:01.200647 kubelet[1424]: I0209 19:43:01.200632 1424 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:43:01.200914 kubelet[1424]: E0209 19:43:01.200892 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:01.201044 kubelet[1424]: E0209 19:43:01.201029 1424 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:01.201503 kubelet[1424]: I0209 19:43:01.201484 1424 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:43:01.201822 kubelet[1424]: W0209 19:43:01.201792 1424 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:43:01.202175 kubelet[1424]: I0209 19:43:01.202152 1424 server.go:1186] "Started kubelet" Feb 9 19:43:01.202757 kubelet[1424]: I0209 19:43:01.202593 1424 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:43:01.202854 kubelet[1424]: E0209 19:43:01.202834 1424 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:43:01.202899 kubelet[1424]: E0209 19:43:01.202857 1424 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:43:01.201000 audit[1424]: AVC avc: denied { mac_admin } for pid=1424 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:01.201000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:43:01.201000 audit[1424]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ae7200 a1=c00107ea80 a2=c000ae71d0 a3=25 items=0 ppid=1 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.201000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:43:01.201000 audit[1424]: AVC avc: denied { mac_admin } for pid=1424 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:01.201000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:43:01.201000 audit[1424]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000223280 a1=c00107ea98 a2=c000ae7290 a3=25 items=0 ppid=1 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.201000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:43:01.203372 kubelet[1424]: I0209 19:43:01.203079 1424 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:43:01.203372 kubelet[1424]: I0209 19:43:01.203129 1424 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:43:01.203372 kubelet[1424]: I0209 19:43:01.203183 1424 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:43:01.203372 kubelet[1424]: I0209 19:43:01.203216 1424 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:43:01.204063 kubelet[1424]: I0209 19:43:01.203674 1424 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:43:01.204063 kubelet[1424]: I0209 19:43:01.203762 1424 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:43:01.220699 kubelet[1424]: E0209 19:43:01.220671 1424 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.0.0.48" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:43:01.220782 kubelet[1424]: W0209 19:43:01.220716 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:43:01.220782 kubelet[1424]: E0209 19:43:01.220737 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:43:01.220782 kubelet[1424]: W0209 19:43:01.220763 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:43:01.220782 kubelet[1424]: E0209 19:43:01.220771 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:43:01.220896 kubelet[1424]: E0209 19:43:01.220800 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bdc4a539", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 202126137, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 202126137, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.221000 kubelet[1424]: W0209 19:43:01.220980 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:43:01.221000 kubelet[1424]: E0209 19:43:01.220995 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:43:01.221913 kubelet[1424]: I0209 19:43:01.221892 1424 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:43:01.221913 kubelet[1424]: I0209 19:43:01.221906 1424 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:43:01.221913 kubelet[1424]: I0209 19:43:01.221918 1424 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:43:01.223000 audit[1437]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.223000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca48cc4b0 a2=0 a3=7ffca48cc49c items=0 ppid=1424 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:43:01.223000 audit[1440]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.223000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff1d186840 a2=0 a3=7fff1d18682c items=0 ppid=1424 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:43:01.225194 kubelet[1424]: E0209 19:43:01.225095 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bdcfaf75", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 202849653, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 202849653, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.226059 kubelet[1424]: E0209 19:43:01.226012 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5548e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 219996814, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 219996814, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.226594 kubelet[1424]: E0209 19:43:01.226542 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed564a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220000932, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220000932, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.227133 kubelet[1424]: E0209 19:43:01.227079 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5709d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220003997, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220003997, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.227000 audit[1444]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.227000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe02b0bcd0 a2=0 a3=7ffe02b0bcbc items=0 ppid=1424 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:43:01.243000 audit[1450]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.243000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7d00dc40 a2=0 a3=7ffd7d00dc2c items=0 ppid=1424 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:43:01.270000 audit[1455]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.270000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffed925ddc0 a2=0 a3=7ffed925ddac items=0 ppid=1424 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:43:01.271000 audit[1456]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.271000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe34796030 a2=0 a3=7ffe3479601c items=0 ppid=1424 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:43:01.274000 audit[1459]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.274000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc0d0b3840 a2=0 a3=7ffc0d0b382c items=0 ppid=1424 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:43:01.277000 audit[1462]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.277000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc5186b820 a2=0 a3=7ffc5186b80c items=0 ppid=1424 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:43:01.278000 audit[1463]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.278000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffc5fbefd0 a2=0 a3=7fffc5fbefbc items=0 ppid=1424 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:43:01.279000 audit[1464]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.279000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd2fa24d0 a2=0 a3=7ffcd2fa24bc items=0 ppid=1424 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:43:01.280000 audit[1466]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.280000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeb9039470 a2=0 a3=7ffeb903945c items=0 ppid=1424 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:43:01.292578 kubelet[1424]: I0209 19:43:01.292548 1424 policy_none.go:49] "None policy: Start" Feb 9 19:43:01.293294 kubelet[1424]: I0209 19:43:01.293265 1424 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:43:01.293364 kubelet[1424]: I0209 19:43:01.293298 1424 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:43:01.282000 audit[1468]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.282000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff87f7acb0 a2=0 a3=7fff87f7ac9c items=0 ppid=1424 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.282000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:43:01.299000 audit[1471]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.299000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffdda370b50 a2=0 a3=7ffdda370b3c items=0 ppid=1424 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:43:01.303000 audit[1473]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.303000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc994ce990 a2=0 a3=7ffc994ce97c items=0 ppid=1424 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:43:01.304471 kubelet[1424]: I0209 19:43:01.304398 1424 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.48" Feb 9 19:43:01.305446 kubelet[1424]: E0209 19:43:01.305414 1424 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.48" Feb 9 19:43:01.305607 kubelet[1424]: E0209 19:43:01.305539 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5548e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 219996814, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 304350678, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5548e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.306298 kubelet[1424]: E0209 19:43:01.306245 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed564a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220000932, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 304361077, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed564a4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.306919 kubelet[1424]: E0209 19:43:01.306865 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5709d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220003997, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 304363592, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5709d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.309000 audit[1476]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.309000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff55a76310 a2=0 a3=7fff55a762fc items=0 ppid=1424 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:43:01.310521 kubelet[1424]: I0209 19:43:01.310505 1424 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:43:01.310000 audit[1477]: NETFILTER_CFG table=mangle:17 family=10 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.310000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce3a7b290 a2=0 a3=7ffce3a7b27c items=0 ppid=1424 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:43:01.310000 audit[1478]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.310000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa76979a0 a2=0 a3=7fffa769798c items=0 ppid=1424 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:43:01.310000 audit[1479]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.310000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcf6001b50 a2=0 a3=7ffcf6001b3c items=0 ppid=1424 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:43:01.310000 audit[1480]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.310000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4d372a50 a2=0 a3=7ffe4d372a3c items=0 ppid=1424 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:43:01.311000 audit[1481]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:01.311000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd35852160 a2=0 a3=7ffd3585214c items=0 ppid=1424 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:43:01.312000 audit[1483]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.312000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd7886ca10 a2=0 a3=7ffd7886c9fc items=0 ppid=1424 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:43:01.313000 audit[1484]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.313000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff7fc6b9a0 a2=0 a3=7fff7fc6b98c items=0 ppid=1424 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:43:01.315000 audit[1486]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.315000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffff8945450 a2=0 a3=7ffff894543c items=0 ppid=1424 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:43:01.315000 audit[1487]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.315000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcbb913a60 a2=0 a3=7ffcbb913a4c items=0 ppid=1424 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:43:01.316000 audit[1488]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.316000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5d29e380 a2=0 a3=7ffe5d29e36c items=0 ppid=1424 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:43:01.318000 audit[1490]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.318000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff6aee26b0 a2=0 a3=7fff6aee269c items=0 ppid=1424 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:43:01.320000 audit[1492]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.320000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffffba5d8a0 a2=0 a3=7ffffba5d88c items=0 ppid=1424 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:43:01.322000 audit[1494]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.322000 audit[1494]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe57b28370 a2=0 a3=7ffe57b2835c items=0 ppid=1424 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:43:01.324000 audit[1496]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.324000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fffbab1af90 a2=0 a3=7fffbab1af7c items=0 ppid=1424 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:43:01.326000 audit[1498]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.326000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffeb4e4ca80 a2=0 a3=7ffeb4e4ca6c items=0 ppid=1424 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:43:01.327921 kubelet[1424]: I0209 19:43:01.327898 1424 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:43:01.327980 kubelet[1424]: I0209 19:43:01.327928 1424 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:43:01.327980 kubelet[1424]: I0209 19:43:01.327960 1424 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:43:01.328045 kubelet[1424]: E0209 19:43:01.328035 1424 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:43:01.327000 audit[1499]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.327000 audit[1499]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4a0f0650 a2=0 a3=7ffc4a0f063c items=0 ppid=1424 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:43:01.329090 kubelet[1424]: W0209 19:43:01.329042 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:43:01.329090 kubelet[1424]: E0209 19:43:01.329070 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:43:01.328000 audit[1500]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.328000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe97dcb610 a2=0 a3=7ffe97dcb5fc items=0 ppid=1424 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:43:01.329000 audit[1501]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:01.329000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefede7900 a2=0 a3=7ffefede78ec items=0 ppid=1424 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:43:01.344223 systemd[1]: Created slice kubepods.slice. Feb 9 19:43:01.347642 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:43:01.350503 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:43:01.359870 kubelet[1424]: I0209 19:43:01.359841 1424 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:43:01.358000 audit[1424]: AVC avc: denied { mac_admin } for pid=1424 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:01.358000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:43:01.358000 audit[1424]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a48120 a1=c0011cc9a8 a2=c000a480f0 a3=25 items=0 ppid=1 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:01.358000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:43:01.360382 kubelet[1424]: I0209 19:43:01.360303 1424 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:43:01.360561 kubelet[1424]: I0209 19:43:01.360537 1424 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:43:01.361201 kubelet[1424]: E0209 19:43:01.361156 1424 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.48\" not found" Feb 9 19:43:01.361810 kubelet[1424]: E0209 19:43:01.361720 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947c73a4b25", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 360831269, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 360831269, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.421586 kubelet[1424]: E0209 19:43:01.421553 1424 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.0.0.48" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:43:01.511737 kubelet[1424]: I0209 19:43:01.506824 1424 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.48" Feb 9 19:43:01.511737 kubelet[1424]: E0209 19:43:01.508025 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5548e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 219996814, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 506771306, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5548e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.511737 kubelet[1424]: E0209 19:43:01.508317 1424 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.48" Feb 9 19:43:01.511983 kubelet[1424]: E0209 19:43:01.508718 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed564a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220000932, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 506784060, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed564a4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.603846 kubelet[1424]: E0209 19:43:01.603742 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5709d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220003997, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 506788218, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5709d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.822614 kubelet[1424]: E0209 19:43:01.822585 1424 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.0.0.48" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:43:01.909724 kubelet[1424]: I0209 19:43:01.909686 1424 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.48" Feb 9 19:43:01.910599 kubelet[1424]: E0209 19:43:01.910514 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5548e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 219996814, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 909636919, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5548e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:01.910719 kubelet[1424]: E0209 19:43:01.910634 1424 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.48" Feb 9 19:43:02.003996 kubelet[1424]: E0209 19:43:02.003915 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed564a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220000932, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 909653059, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed564a4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:02.160918 kubelet[1424]: W0209 19:43:02.160790 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:43:02.160918 kubelet[1424]: E0209 19:43:02.160826 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:43:02.201100 kubelet[1424]: E0209 19:43:02.201058 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:02.203972 kubelet[1424]: E0209 19:43:02.203878 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5709d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220003997, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 909657528, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5709d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:02.284611 kubelet[1424]: W0209 19:43:02.284577 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:43:02.284611 kubelet[1424]: E0209 19:43:02.284608 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:43:02.433759 kubelet[1424]: W0209 19:43:02.433637 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:43:02.433759 kubelet[1424]: E0209 19:43:02.433672 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:43:02.624409 kubelet[1424]: E0209 19:43:02.624372 1424 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.0.0.48" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:43:02.668501 kubelet[1424]: W0209 19:43:02.668469 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:43:02.668580 kubelet[1424]: E0209 19:43:02.668510 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:43:02.711915 kubelet[1424]: I0209 19:43:02.711760 1424 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.48" Feb 9 19:43:02.712848 kubelet[1424]: E0209 19:43:02.712808 1424 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.48" Feb 9 19:43:02.713065 kubelet[1424]: E0209 19:43:02.712965 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5548e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 219996814, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 2, 711711559, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5548e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:02.713820 kubelet[1424]: E0209 19:43:02.713754 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed564a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220000932, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 2, 711724102, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed564a4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:02.804341 kubelet[1424]: E0209 19:43:02.804263 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5709d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220003997, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 2, 711731105, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5709d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:03.202250 kubelet[1424]: E0209 19:43:03.202185 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:03.794043 kubelet[1424]: W0209 19:43:03.793993 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:43:03.794043 kubelet[1424]: E0209 19:43:03.794026 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:43:04.202991 kubelet[1424]: E0209 19:43:04.202930 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:04.225763 kubelet[1424]: E0209 19:43:04.225725 1424 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.0.0.48" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:43:04.313463 kubelet[1424]: I0209 19:43:04.313446 1424 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.48" Feb 9 19:43:04.314526 kubelet[1424]: E0209 19:43:04.314506 1424 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.48" Feb 9 19:43:04.314602 kubelet[1424]: E0209 19:43:04.314482 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5548e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 219996814, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 4, 313409943, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5548e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:04.315222 kubelet[1424]: E0209 19:43:04.315174 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed564a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220000932, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 4, 313419932, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed564a4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:04.316058 kubelet[1424]: E0209 19:43:04.316012 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5709d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220003997, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 4, 313422677, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5709d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:04.977134 kubelet[1424]: W0209 19:43:04.977068 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:43:04.977134 kubelet[1424]: E0209 19:43:04.977113 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:43:05.175034 kubelet[1424]: W0209 19:43:05.174994 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:43:05.175034 kubelet[1424]: E0209 19:43:05.175025 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:43:05.203301 kubelet[1424]: E0209 19:43:05.203272 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:05.563484 kubelet[1424]: W0209 19:43:05.563419 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:43:05.563484 kubelet[1424]: E0209 19:43:05.563485 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:43:06.203603 kubelet[1424]: E0209 19:43:06.203547 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:07.204290 kubelet[1424]: E0209 19:43:07.204217 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:07.428205 kubelet[1424]: E0209 19:43:07.428153 1424 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.0.0.48" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:43:07.516394 kubelet[1424]: I0209 19:43:07.516264 1424 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.48" Feb 9 19:43:07.517572 kubelet[1424]: E0209 19:43:07.517433 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5548e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.48 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 219996814, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 7, 516224690, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5548e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:07.517851 kubelet[1424]: E0209 19:43:07.517530 1424 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.48" Feb 9 19:43:07.518433 kubelet[1424]: E0209 19:43:07.518368 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed564a4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.48 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220000932, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 7, 516234238, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed564a4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:07.519189 kubelet[1424]: E0209 19:43:07.519092 1424 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48.17b24947bed5709d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.48", UID:"10.0.0.48", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.48 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.48"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 43, 1, 220003997, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 43, 7, 516236622, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.0.0.48.17b24947bed5709d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:43:08.204857 kubelet[1424]: E0209 19:43:08.204788 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:08.351631 kubelet[1424]: W0209 19:43:08.351580 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:43:08.351631 kubelet[1424]: E0209 19:43:08.351618 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:43:08.729130 kubelet[1424]: W0209 19:43:08.729069 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:43:08.729130 kubelet[1424]: E0209 19:43:08.729125 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:43:08.983912 kubelet[1424]: W0209 19:43:08.983753 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:43:08.983912 kubelet[1424]: E0209 19:43:08.983805 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.48" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:43:09.204997 kubelet[1424]: E0209 19:43:09.204922 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:09.919045 kubelet[1424]: W0209 19:43:09.918997 1424 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:43:09.919045 kubelet[1424]: E0209 19:43:09.919036 1424 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:43:10.205553 kubelet[1424]: E0209 19:43:10.205409 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:11.192599 kubelet[1424]: I0209 19:43:11.192537 1424 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 19:43:11.205863 kubelet[1424]: E0209 19:43:11.205838 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:11.361276 kubelet[1424]: E0209 19:43:11.361234 1424 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.48\" not found" Feb 9 19:43:11.558388 kubelet[1424]: E0209 19:43:11.558352 1424 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.48" not found Feb 9 19:43:12.206784 kubelet[1424]: E0209 19:43:12.206725 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:12.623813 kubelet[1424]: E0209 19:43:12.623775 1424 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.48" not found Feb 9 19:43:13.207412 kubelet[1424]: E0209 19:43:13.207353 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:13.831408 kubelet[1424]: E0209 19:43:13.831357 1424 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.48\" not found" node="10.0.0.48" Feb 9 19:43:13.918633 kubelet[1424]: I0209 19:43:13.918600 1424 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.48" Feb 9 19:43:14.026148 kubelet[1424]: I0209 19:43:14.026056 1424 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.48" Feb 9 19:43:14.073581 kubelet[1424]: E0209 19:43:14.073518 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.173862 kubelet[1424]: E0209 19:43:14.173667 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.192850 sudo[1243]: pam_unix(sudo:session): session closed for user root Feb 9 19:43:14.191000 audit[1243]: USER_END pid=1243 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:43:14.194119 kernel: kauditd_printk_skb: 457 callbacks suppressed Feb 9 19:43:14.194252 kernel: audit: type=1106 audit(1707507794.191:572): pid=1243 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:43:14.193971 sshd[1240]: pam_unix(sshd:session): session closed for user core Feb 9 19:43:14.196234 systemd[1]: sshd@6-10.0.0.48:22-10.0.0.1:51910.service: Deactivated successfully. Feb 9 19:43:14.191000 audit[1243]: CRED_DISP pid=1243 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:43:14.197035 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:43:14.197597 systemd-logind[1100]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:43:14.198244 systemd-logind[1100]: Removed session 7. Feb 9 19:43:14.199557 kernel: audit: type=1104 audit(1707507794.191:573): pid=1243 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:43:14.199611 kernel: audit: type=1106 audit(1707507794.193:574): pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.193000 audit[1240]: USER_END pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.193000 audit[1240]: CRED_DISP pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.205315 kernel: audit: type=1104 audit(1707507794.193:575): pid=1240 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 9 19:43:14.205362 kernel: audit: type=1131 audit(1707507794.193:576): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.48:22-10.0.0.1:51910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:14.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.48:22-10.0.0.1:51910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:43:14.207583 kubelet[1424]: E0209 19:43:14.207551 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:14.273831 kubelet[1424]: E0209 19:43:14.273807 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.374849 kubelet[1424]: E0209 19:43:14.374801 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.475605 kubelet[1424]: E0209 19:43:14.475487 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.576077 kubelet[1424]: E0209 19:43:14.576021 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.677052 kubelet[1424]: E0209 19:43:14.676985 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.777811 kubelet[1424]: E0209 19:43:14.777643 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.878218 kubelet[1424]: E0209 19:43:14.878155 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:14.978718 kubelet[1424]: E0209 19:43:14.978654 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.079221 kubelet[1424]: E0209 19:43:15.079171 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.179648 kubelet[1424]: E0209 19:43:15.179605 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.208342 kubelet[1424]: E0209 19:43:15.208299 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:15.280442 kubelet[1424]: E0209 19:43:15.280415 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.381436 kubelet[1424]: E0209 19:43:15.381290 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.481903 kubelet[1424]: E0209 19:43:15.481819 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.582390 kubelet[1424]: E0209 19:43:15.582314 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.682913 kubelet[1424]: E0209 19:43:15.682791 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.783169 kubelet[1424]: E0209 19:43:15.783128 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.883656 kubelet[1424]: E0209 19:43:15.883629 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:15.984283 kubelet[1424]: E0209 19:43:15.984154 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.084758 kubelet[1424]: E0209 19:43:16.084678 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.185161 kubelet[1424]: E0209 19:43:16.185093 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.208714 kubelet[1424]: E0209 19:43:16.208647 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:16.286274 kubelet[1424]: E0209 19:43:16.286129 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.386617 kubelet[1424]: E0209 19:43:16.386580 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.487142 kubelet[1424]: E0209 19:43:16.487049 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.587922 kubelet[1424]: E0209 19:43:16.587835 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.688308 kubelet[1424]: E0209 19:43:16.688225 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.788821 kubelet[1424]: E0209 19:43:16.788741 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.889310 kubelet[1424]: E0209 19:43:16.889160 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:16.989853 kubelet[1424]: E0209 19:43:16.989772 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.090262 kubelet[1424]: E0209 19:43:17.090177 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.190741 kubelet[1424]: E0209 19:43:17.190542 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.209096 kubelet[1424]: E0209 19:43:17.209031 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:17.291531 kubelet[1424]: E0209 19:43:17.291450 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.391696 kubelet[1424]: E0209 19:43:17.391640 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.492291 kubelet[1424]: E0209 19:43:17.492144 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.592866 kubelet[1424]: E0209 19:43:17.592787 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.693377 kubelet[1424]: E0209 19:43:17.693310 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.794131 kubelet[1424]: E0209 19:43:17.793969 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.894384 kubelet[1424]: E0209 19:43:17.894333 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:17.995047 kubelet[1424]: E0209 19:43:17.994987 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:18.095486 kubelet[1424]: E0209 19:43:18.095445 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:18.196237 kubelet[1424]: E0209 19:43:18.196183 1424 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.0.0.48\" not found" Feb 9 19:43:18.209614 kubelet[1424]: E0209 19:43:18.209553 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:18.296814 kubelet[1424]: I0209 19:43:18.296782 1424 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 19:43:18.297258 env[1115]: time="2024-02-09T19:43:18.297211597Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:43:18.297536 kubelet[1424]: I0209 19:43:18.297371 1424 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 19:43:19.210481 kubelet[1424]: E0209 19:43:19.210426 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:19.210935 kubelet[1424]: I0209 19:43:19.210460 1424 apiserver.go:52] "Watching apiserver" Feb 9 19:43:19.213533 kubelet[1424]: I0209 19:43:19.213504 1424 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:43:19.213642 kubelet[1424]: I0209 19:43:19.213625 1424 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:43:19.213700 kubelet[1424]: I0209 19:43:19.213676 1424 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:43:19.213944 kubelet[1424]: E0209 19:43:19.213922 1424 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:19.219044 systemd[1]: Created slice kubepods-besteffort-pod8b0b855d_6e82_4ac8_a185_2e48d02e3f3c.slice. Feb 9 19:43:19.229261 systemd[1]: Created slice kubepods-besteffort-pod420cc3ca_ee09_4a39_83f3_0cffabf2295a.slice. Feb 9 19:43:19.305594 kubelet[1424]: I0209 19:43:19.305547 1424 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:43:19.403568 kubelet[1424]: I0209 19:43:19.403543 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-node-certs\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.403658 kubelet[1424]: I0209 19:43:19.403576 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-var-lib-calico\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.403658 kubelet[1424]: I0209 19:43:19.403599 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dfb4x\" (UniqueName: \"kubernetes.io/projected/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-kube-api-access-dfb4x\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.403658 kubelet[1424]: I0209 19:43:19.403616 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zmv5l\" (UniqueName: \"kubernetes.io/projected/420cc3ca-ee09-4a39-83f3-0cffabf2295a-kube-api-access-zmv5l\") pod \"kube-proxy-sp7l4\" (UID: \"420cc3ca-ee09-4a39-83f3-0cffabf2295a\") " pod="kube-system/kube-proxy-sp7l4" Feb 9 19:43:19.403771 kubelet[1424]: I0209 19:43:19.403733 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/af77093f-b116-4d38-b63b-04d9b5587b5c-socket-dir\") pod \"csi-node-driver-szh6v\" (UID: \"af77093f-b116-4d38-b63b-04d9b5587b5c\") " pod="calico-system/csi-node-driver-szh6v" Feb 9 19:43:19.403841 kubelet[1424]: I0209 19:43:19.403809 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-lib-modules\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.403876 kubelet[1424]: I0209 19:43:19.403840 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-policysync\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.403919 kubelet[1424]: I0209 19:43:19.403904 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-cni-log-dir\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.403967 kubelet[1424]: I0209 19:43:19.403957 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-flexvol-driver-host\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.404011 kubelet[1424]: I0209 19:43:19.404004 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/420cc3ca-ee09-4a39-83f3-0cffabf2295a-xtables-lock\") pod \"kube-proxy-sp7l4\" (UID: \"420cc3ca-ee09-4a39-83f3-0cffabf2295a\") " pod="kube-system/kube-proxy-sp7l4" Feb 9 19:43:19.404071 kubelet[1424]: I0209 19:43:19.404046 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-47lpt\" (UniqueName: \"kubernetes.io/projected/af77093f-b116-4d38-b63b-04d9b5587b5c-kube-api-access-47lpt\") pod \"csi-node-driver-szh6v\" (UID: \"af77093f-b116-4d38-b63b-04d9b5587b5c\") " pod="calico-system/csi-node-driver-szh6v" Feb 9 19:43:19.404140 kubelet[1424]: I0209 19:43:19.404085 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-xtables-lock\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.404140 kubelet[1424]: I0209 19:43:19.404130 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/420cc3ca-ee09-4a39-83f3-0cffabf2295a-kube-proxy\") pod \"kube-proxy-sp7l4\" (UID: \"420cc3ca-ee09-4a39-83f3-0cffabf2295a\") " pod="kube-system/kube-proxy-sp7l4" Feb 9 19:43:19.404195 kubelet[1424]: I0209 19:43:19.404153 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/af77093f-b116-4d38-b63b-04d9b5587b5c-kubelet-dir\") pod \"csi-node-driver-szh6v\" (UID: \"af77093f-b116-4d38-b63b-04d9b5587b5c\") " pod="calico-system/csi-node-driver-szh6v" Feb 9 19:43:19.404218 kubelet[1424]: I0209 19:43:19.404198 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-tigera-ca-bundle\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.404259 kubelet[1424]: I0209 19:43:19.404243 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-var-run-calico\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.404289 kubelet[1424]: I0209 19:43:19.404280 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-cni-bin-dir\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.404313 kubelet[1424]: I0209 19:43:19.404310 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8b0b855d-6e82-4ac8-a185-2e48d02e3f3c-cni-net-dir\") pod \"calico-node-xdq4s\" (UID: \"8b0b855d-6e82-4ac8-a185-2e48d02e3f3c\") " pod="calico-system/calico-node-xdq4s" Feb 9 19:43:19.404353 kubelet[1424]: I0209 19:43:19.404339 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/420cc3ca-ee09-4a39-83f3-0cffabf2295a-lib-modules\") pod \"kube-proxy-sp7l4\" (UID: \"420cc3ca-ee09-4a39-83f3-0cffabf2295a\") " pod="kube-system/kube-proxy-sp7l4" Feb 9 19:43:19.404380 kubelet[1424]: I0209 19:43:19.404369 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/af77093f-b116-4d38-b63b-04d9b5587b5c-varrun\") pod \"csi-node-driver-szh6v\" (UID: \"af77093f-b116-4d38-b63b-04d9b5587b5c\") " pod="calico-system/csi-node-driver-szh6v" Feb 9 19:43:19.404433 kubelet[1424]: I0209 19:43:19.404425 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/af77093f-b116-4d38-b63b-04d9b5587b5c-registration-dir\") pod \"csi-node-driver-szh6v\" (UID: \"af77093f-b116-4d38-b63b-04d9b5587b5c\") " pod="calico-system/csi-node-driver-szh6v" Feb 9 19:43:19.404461 kubelet[1424]: I0209 19:43:19.404449 1424 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:43:19.506919 kubelet[1424]: E0209 19:43:19.506806 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.506919 kubelet[1424]: W0209 19:43:19.506839 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.506919 kubelet[1424]: E0209 19:43:19.506866 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.507143 kubelet[1424]: E0209 19:43:19.507085 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.507143 kubelet[1424]: W0209 19:43:19.507095 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.507143 kubelet[1424]: E0209 19:43:19.507137 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.507373 kubelet[1424]: E0209 19:43:19.507354 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.507474 kubelet[1424]: W0209 19:43:19.507454 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.507580 kubelet[1424]: E0209 19:43:19.507562 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.507840 kubelet[1424]: E0209 19:43:19.507829 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.507940 kubelet[1424]: W0209 19:43:19.507924 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.508057 kubelet[1424]: E0209 19:43:19.508030 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.508299 kubelet[1424]: E0209 19:43:19.508273 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.508377 kubelet[1424]: W0209 19:43:19.508297 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.508377 kubelet[1424]: E0209 19:43:19.508338 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.508529 kubelet[1424]: E0209 19:43:19.508513 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.508529 kubelet[1424]: W0209 19:43:19.508528 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.508636 kubelet[1424]: E0209 19:43:19.508548 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.509929 kubelet[1424]: E0209 19:43:19.509910 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.509929 kubelet[1424]: W0209 19:43:19.509924 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.510009 kubelet[1424]: E0209 19:43:19.509938 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.607000 kubelet[1424]: E0209 19:43:19.606956 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.607000 kubelet[1424]: W0209 19:43:19.606979 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.607000 kubelet[1424]: E0209 19:43:19.607001 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.607266 kubelet[1424]: E0209 19:43:19.607225 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.607266 kubelet[1424]: W0209 19:43:19.607236 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.607266 kubelet[1424]: E0209 19:43:19.607247 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.607449 kubelet[1424]: E0209 19:43:19.607430 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.607449 kubelet[1424]: W0209 19:43:19.607444 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.607525 kubelet[1424]: E0209 19:43:19.607457 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.708400 kubelet[1424]: E0209 19:43:19.708330 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.708400 kubelet[1424]: W0209 19:43:19.708355 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.708400 kubelet[1424]: E0209 19:43:19.708385 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.708670 kubelet[1424]: E0209 19:43:19.708575 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.708670 kubelet[1424]: W0209 19:43:19.708586 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.708670 kubelet[1424]: E0209 19:43:19.708600 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.708788 kubelet[1424]: E0209 19:43:19.708766 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.708788 kubelet[1424]: W0209 19:43:19.708780 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.708845 kubelet[1424]: E0209 19:43:19.708792 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.809854 kubelet[1424]: E0209 19:43:19.809818 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.809854 kubelet[1424]: W0209 19:43:19.809844 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.810035 kubelet[1424]: E0209 19:43:19.809872 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.810061 kubelet[1424]: E0209 19:43:19.810055 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.810084 kubelet[1424]: W0209 19:43:19.810064 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.810084 kubelet[1424]: E0209 19:43:19.810078 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.810279 kubelet[1424]: E0209 19:43:19.810261 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.810279 kubelet[1424]: W0209 19:43:19.810275 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.810347 kubelet[1424]: E0209 19:43:19.810293 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.911444 kubelet[1424]: E0209 19:43:19.911384 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.911444 kubelet[1424]: W0209 19:43:19.911411 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.911444 kubelet[1424]: E0209 19:43:19.911435 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.911706 kubelet[1424]: E0209 19:43:19.911611 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.911706 kubelet[1424]: W0209 19:43:19.911617 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.911706 kubelet[1424]: E0209 19:43:19.911633 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:19.911830 kubelet[1424]: E0209 19:43:19.911812 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:19.911830 kubelet[1424]: W0209 19:43:19.911822 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:19.911830 kubelet[1424]: E0209 19:43:19.911831 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.012792 kubelet[1424]: E0209 19:43:20.012748 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.012792 kubelet[1424]: W0209 19:43:20.012775 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.012792 kubelet[1424]: E0209 19:43:20.012799 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.013013 kubelet[1424]: E0209 19:43:20.013001 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.013013 kubelet[1424]: W0209 19:43:20.013008 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.013065 kubelet[1424]: E0209 19:43:20.013017 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.013241 kubelet[1424]: E0209 19:43:20.013222 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.013241 kubelet[1424]: W0209 19:43:20.013233 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.013241 kubelet[1424]: E0209 19:43:20.013242 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.114394 kubelet[1424]: E0209 19:43:20.114253 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.114394 kubelet[1424]: W0209 19:43:20.114282 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.114394 kubelet[1424]: E0209 19:43:20.114310 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.114634 kubelet[1424]: E0209 19:43:20.114547 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.114634 kubelet[1424]: W0209 19:43:20.114557 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.114634 kubelet[1424]: E0209 19:43:20.114570 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.114767 kubelet[1424]: E0209 19:43:20.114742 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.114767 kubelet[1424]: W0209 19:43:20.114762 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.114841 kubelet[1424]: E0209 19:43:20.114778 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.211891 kubelet[1424]: E0209 19:43:20.211830 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:20.215304 kubelet[1424]: E0209 19:43:20.215288 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.215304 kubelet[1424]: W0209 19:43:20.215301 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.215422 kubelet[1424]: E0209 19:43:20.215319 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.215515 kubelet[1424]: E0209 19:43:20.215495 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.215515 kubelet[1424]: W0209 19:43:20.215506 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.215515 kubelet[1424]: E0209 19:43:20.215514 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.215651 kubelet[1424]: E0209 19:43:20.215640 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.215651 kubelet[1424]: W0209 19:43:20.215649 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.215701 kubelet[1424]: E0209 19:43:20.215658 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.250132 kubelet[1424]: E0209 19:43:20.249158 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.250132 kubelet[1424]: W0209 19:43:20.249175 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.250132 kubelet[1424]: E0209 19:43:20.249190 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.250132 kubelet[1424]: E0209 19:43:20.249555 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.250132 kubelet[1424]: W0209 19:43:20.249562 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.250132 kubelet[1424]: E0209 19:43:20.249575 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.253783 kubelet[1424]: E0209 19:43:20.253767 1424 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:43:20.253878 kubelet[1424]: W0209 19:43:20.253858 1424 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:43:20.253932 kubelet[1424]: E0209 19:43:20.253881 1424 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:43:20.429184 kubelet[1424]: E0209 19:43:20.429052 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:20.429963 env[1115]: time="2024-02-09T19:43:20.429916358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xdq4s,Uid:8b0b855d-6e82-4ac8-a185-2e48d02e3f3c,Namespace:calico-system,Attempt:0,}" Feb 9 19:43:20.431494 kubelet[1424]: E0209 19:43:20.431460 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:20.431822 env[1115]: time="2024-02-09T19:43:20.431787336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sp7l4,Uid:420cc3ca-ee09-4a39-83f3-0cffabf2295a,Namespace:kube-system,Attempt:0,}" Feb 9 19:43:21.200995 kubelet[1424]: E0209 19:43:21.200946 1424 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:21.212098 kubelet[1424]: E0209 19:43:21.212069 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:21.329135 kubelet[1424]: E0209 19:43:21.329065 1424 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:21.700310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1910446632.mount: Deactivated successfully. Feb 9 19:43:21.707145 env[1115]: time="2024-02-09T19:43:21.707078928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:21.708070 env[1115]: time="2024-02-09T19:43:21.708013921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:21.710394 env[1115]: time="2024-02-09T19:43:21.710346655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:21.711379 env[1115]: time="2024-02-09T19:43:21.711351298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:21.712704 env[1115]: time="2024-02-09T19:43:21.712663909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:21.713972 env[1115]: time="2024-02-09T19:43:21.713941475Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:21.717738 env[1115]: time="2024-02-09T19:43:21.717685926Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:21.718995 env[1115]: time="2024-02-09T19:43:21.718946980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:21.780198 env[1115]: time="2024-02-09T19:43:21.780129447Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:43:21.780304 env[1115]: time="2024-02-09T19:43:21.780175393Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:43:21.780304 env[1115]: time="2024-02-09T19:43:21.780187035Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:43:21.780582 env[1115]: time="2024-02-09T19:43:21.780503519Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7 pid=1549 runtime=io.containerd.runc.v2 Feb 9 19:43:21.791394 env[1115]: time="2024-02-09T19:43:21.791319679Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:43:21.791508 env[1115]: time="2024-02-09T19:43:21.791374361Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:43:21.791508 env[1115]: time="2024-02-09T19:43:21.791384991Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:43:21.791682 env[1115]: time="2024-02-09T19:43:21.791523231Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f0f4208f99c357da0e9bae8726ecb8cc301b727e70f51d87ffbe2911e212774 pid=1570 runtime=io.containerd.runc.v2 Feb 9 19:43:21.797413 systemd[1]: Started cri-containerd-7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7.scope. Feb 9 19:43:21.808876 systemd[1]: Started cri-containerd-8f0f4208f99c357da0e9bae8726ecb8cc301b727e70f51d87ffbe2911e212774.scope. Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823559 kernel: audit: type=1400 audit(1707507801.818:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823622 kernel: audit: type=1400 audit(1707507801.818:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823645 kernel: audit: type=1400 audit(1707507801.818:579): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.827553 kernel: audit: type=1400 audit(1707507801.818:580): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.827618 kernel: audit: type=1400 audit(1707507801.818:581): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.831960 kernel: audit: type=1400 audit(1707507801.818:582): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.836360 kernel: audit: type=1400 audit(1707507801.818:583): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.836444 kernel: audit: type=1400 audit(1707507801.818:584): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.838517 kernel: audit: type=1400 audit(1707507801.818:585): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.841123 kernel: audit: type=1400 audit(1707507801.821:586): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.821000 audit: BPF prog-id=67 op=LOAD Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1549 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346264313238303530343766363333333231666633633637323966 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1549 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346264313238303530343766363333333231666633633637323966 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.823000 audit: BPF prog-id=68 op=LOAD Feb 9 19:43:21.823000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020e680 items=0 ppid=1549 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346264313238303530343766363333333231666633633637323966 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.825000 audit: BPF prog-id=69 op=LOAD Feb 9 19:43:21.825000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020e6c8 items=0 ppid=1549 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346264313238303530343766363333333231666633633637323966 Feb 9 19:43:21.829000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:43:21.829000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { perfmon } for pid=1558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit[1558]: AVC avc: denied { bpf } for pid=1558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.829000 audit: BPF prog-id=70 op=LOAD Feb 9 19:43:21.829000 audit[1558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020ead8 items=0 ppid=1549 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762346264313238303530343766363333333231666633633637323966 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.835000 audit: BPF prog-id=71 op=LOAD Feb 9 19:43:21.835000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.835000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1570 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866306634323038663939633335376461306539626165383732366563 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1570 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866306634323038663939633335376461306539626165383732366563 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit: BPF prog-id=72 op=LOAD Feb 9 19:43:21.842000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003cac50 items=0 ppid=1570 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866306634323038663939633335376461306539626165383732366563 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit: BPF prog-id=73 op=LOAD Feb 9 19:43:21.842000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003cac98 items=0 ppid=1570 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866306634323038663939633335376461306539626165383732366563 Feb 9 19:43:21.842000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:43:21.842000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { perfmon } for pid=1581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit[1581]: AVC avc: denied { bpf } for pid=1581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:21.842000 audit: BPF prog-id=74 op=LOAD Feb 9 19:43:21.842000 audit[1581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003cb0a8 items=0 ppid=1570 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:21.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866306634323038663939633335376461306539626165383732366563 Feb 9 19:43:21.930191 env[1115]: time="2024-02-09T19:43:21.930138043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xdq4s,Uid:8b0b855d-6e82-4ac8-a185-2e48d02e3f3c,Namespace:calico-system,Attempt:0,} returns sandbox id \"7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7\"" Feb 9 19:43:21.931740 kubelet[1424]: E0209 19:43:21.931354 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:21.932988 env[1115]: time="2024-02-09T19:43:21.932959454Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:43:21.935697 env[1115]: time="2024-02-09T19:43:21.935638577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sp7l4,Uid:420cc3ca-ee09-4a39-83f3-0cffabf2295a,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f0f4208f99c357da0e9bae8726ecb8cc301b727e70f51d87ffbe2911e212774\"" Feb 9 19:43:21.936256 kubelet[1424]: E0209 19:43:21.936224 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:22.213207 kubelet[1424]: E0209 19:43:22.213140 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:23.213549 kubelet[1424]: E0209 19:43:23.213498 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:23.328740 kubelet[1424]: E0209 19:43:23.328675 1424 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:24.213815 kubelet[1424]: E0209 19:43:24.213765 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:25.112185 env[1115]: time="2024-02-09T19:43:25.112137602Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:25.114023 env[1115]: time="2024-02-09T19:43:25.113978183Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:25.116054 env[1115]: time="2024-02-09T19:43:25.116010133Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:25.117850 env[1115]: time="2024-02-09T19:43:25.117817041Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:25.118669 env[1115]: time="2024-02-09T19:43:25.118632279Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:43:25.119552 env[1115]: time="2024-02-09T19:43:25.119355305Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:43:25.120454 env[1115]: time="2024-02-09T19:43:25.120419410Z" level=info msg="CreateContainer within sandbox \"7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:43:25.132273 env[1115]: time="2024-02-09T19:43:25.132203115Z" level=info msg="CreateContainer within sandbox \"7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fe8c12f2f42ed363b460b9913cb1292837fb4e76971c6532aeb73c008fc47e42\"" Feb 9 19:43:25.132809 env[1115]: time="2024-02-09T19:43:25.132778584Z" level=info msg="StartContainer for \"fe8c12f2f42ed363b460b9913cb1292837fb4e76971c6532aeb73c008fc47e42\"" Feb 9 19:43:25.148784 systemd[1]: Started cri-containerd-fe8c12f2f42ed363b460b9913cb1292837fb4e76971c6532aeb73c008fc47e42.scope. Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1549 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:25.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386331326632663432656433363362343630623939313363623132 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit: BPF prog-id=75 op=LOAD Feb 9 19:43:25.163000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000245fc0 items=0 ppid=1549 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:25.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386331326632663432656433363362343630623939313363623132 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit: BPF prog-id=76 op=LOAD Feb 9 19:43:25.163000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000392008 items=0 ppid=1549 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:25.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386331326632663432656433363362343630623939313363623132 Feb 9 19:43:25.163000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:43:25.163000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { perfmon } for pid=1629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit[1629]: AVC avc: denied { bpf } for pid=1629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:25.163000 audit: BPF prog-id=77 op=LOAD Feb 9 19:43:25.163000 audit[1629]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000392098 items=0 ppid=1549 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:25.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665386331326632663432656433363362343630623939313363623132 Feb 9 19:43:25.179135 env[1115]: time="2024-02-09T19:43:25.177931555Z" level=info msg="StartContainer for \"fe8c12f2f42ed363b460b9913cb1292837fb4e76971c6532aeb73c008fc47e42\" returns successfully" Feb 9 19:43:25.185741 systemd[1]: cri-containerd-fe8c12f2f42ed363b460b9913cb1292837fb4e76971c6532aeb73c008fc47e42.scope: Deactivated successfully. Feb 9 19:43:25.188000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:43:25.204190 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fe8c12f2f42ed363b460b9913cb1292837fb4e76971c6532aeb73c008fc47e42-rootfs.mount: Deactivated successfully. Feb 9 19:43:25.214368 kubelet[1424]: E0209 19:43:25.214321 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:25.275370 env[1115]: time="2024-02-09T19:43:25.275311092Z" level=info msg="shim disconnected" id=fe8c12f2f42ed363b460b9913cb1292837fb4e76971c6532aeb73c008fc47e42 Feb 9 19:43:25.275370 env[1115]: time="2024-02-09T19:43:25.275357980Z" level=warning msg="cleaning up after shim disconnected" id=fe8c12f2f42ed363b460b9913cb1292837fb4e76971c6532aeb73c008fc47e42 namespace=k8s.io Feb 9 19:43:25.275370 env[1115]: time="2024-02-09T19:43:25.275367939Z" level=info msg="cleaning up dead shim" Feb 9 19:43:25.282153 env[1115]: time="2024-02-09T19:43:25.282079613Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:43:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1668 runtime=io.containerd.runc.v2\n" Feb 9 19:43:25.329334 kubelet[1424]: E0209 19:43:25.329276 1424 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:25.364050 kubelet[1424]: E0209 19:43:25.363910 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:26.215494 kubelet[1424]: E0209 19:43:26.215441 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:26.221990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4035340628.mount: Deactivated successfully. Feb 9 19:43:26.870768 env[1115]: time="2024-02-09T19:43:26.870698523Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:26.873414 env[1115]: time="2024-02-09T19:43:26.873346628Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:26.896934 env[1115]: time="2024-02-09T19:43:26.896861078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:26.918680 env[1115]: time="2024-02-09T19:43:26.918615267Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:26.919040 env[1115]: time="2024-02-09T19:43:26.919002523Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 19:43:26.919863 env[1115]: time="2024-02-09T19:43:26.919833160Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:43:26.920570 env[1115]: time="2024-02-09T19:43:26.920545185Z" level=info msg="CreateContainer within sandbox \"8f0f4208f99c357da0e9bae8726ecb8cc301b727e70f51d87ffbe2911e212774\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:43:27.144779 env[1115]: time="2024-02-09T19:43:27.144657446Z" level=info msg="CreateContainer within sandbox \"8f0f4208f99c357da0e9bae8726ecb8cc301b727e70f51d87ffbe2911e212774\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3ebfcc149a8ac2d91199ef551158dbae955d834a7e4e55a89eef562e44054415\"" Feb 9 19:43:27.145249 env[1115]: time="2024-02-09T19:43:27.145197508Z" level=info msg="StartContainer for \"3ebfcc149a8ac2d91199ef551158dbae955d834a7e4e55a89eef562e44054415\"" Feb 9 19:43:27.163845 systemd[1]: Started cri-containerd-3ebfcc149a8ac2d91199ef551158dbae955d834a7e4e55a89eef562e44054415.scope. Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.179979 kernel: kauditd_printk_skb: 148 callbacks suppressed Feb 9 19:43:27.180064 kernel: audit: type=1400 audit(1707507807.176:620): avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.180090 kernel: audit: type=1300 audit(1707507807.176:620): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1570 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.176000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1570 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.182924 kernel: audit: type=1327 audit(1707507807.176:620): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626663633134396138616332643931313939656635353131353864 Feb 9 19:43:27.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626663633134396138616332643931313939656635353131353864 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.187575 kernel: audit: type=1400 audit(1707507807.176:621): avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.187628 kernel: audit: type=1400 audit(1707507807.176:621): avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.189553 kernel: audit: type=1400 audit(1707507807.176:621): avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.191471 kernel: audit: type=1400 audit(1707507807.176:621): avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.195377 kernel: audit: type=1400 audit(1707507807.176:621): avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.195433 kernel: audit: type=1400 audit(1707507807.176:621): avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.199368 kernel: audit: type=1400 audit(1707507807.176:621): avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.176000 audit: BPF prog-id=78 op=LOAD Feb 9 19:43:27.176000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00032dc10 items=0 ppid=1570 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626663633134396138616332643931313939656635353131353864 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.181000 audit: BPF prog-id=79 op=LOAD Feb 9 19:43:27.181000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00032dc58 items=0 ppid=1570 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626663633134396138616332643931313939656635353131353864 Feb 9 19:43:27.184000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:43:27.184000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { perfmon } for pid=1692 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit[1692]: AVC avc: denied { bpf } for pid=1692 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:27.184000 audit: BPF prog-id=80 op=LOAD Feb 9 19:43:27.184000 audit[1692]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00032dce8 items=0 ppid=1570 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365626663633134396138616332643931313939656635353131353864 Feb 9 19:43:27.211736 env[1115]: time="2024-02-09T19:43:27.206995500Z" level=info msg="StartContainer for \"3ebfcc149a8ac2d91199ef551158dbae955d834a7e4e55a89eef562e44054415\" returns successfully" Feb 9 19:43:27.216132 kubelet[1424]: E0209 19:43:27.216068 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:27.241000 audit[1744]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.241000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1b180190 a2=0 a3=7fff1b18017c items=0 ppid=1703 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:43:27.244000 audit[1745]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.244000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc0792780 a2=0 a3=7ffcc079276c items=0 ppid=1703 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:43:27.245000 audit[1746]: NETFILTER_CFG table=nat:37 family=10 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.245000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdc1f2ec0 a2=0 a3=7fffdc1f2eac items=0 ppid=1703 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:43:27.245000 audit[1747]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.245000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc05f292a0 a2=0 a3=7ffc05f2928c items=0 ppid=1703 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:43:27.247000 audit[1748]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.247000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9324ec20 a2=0 a3=7fff9324ec0c items=0 ppid=1703 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:43:27.247000 audit[1749]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.247000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc59170ef0 a2=0 a3=7ffc59170edc items=0 ppid=1703 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:43:27.329097 kubelet[1424]: E0209 19:43:27.329052 1424 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:27.345000 audit[1751]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.345000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd16deef30 a2=0 a3=7ffd16deef1c items=0 ppid=1703 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:43:27.347000 audit[1753]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.347000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe562ece40 a2=0 a3=7ffe562ece2c items=0 ppid=1703 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:43:27.351000 audit[1756]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.351000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3e5cb8c0 a2=0 a3=7ffe3e5cb8ac items=0 ppid=1703 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:43:27.352000 audit[1757]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.352000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd284d20c0 a2=0 a3=7ffd284d20ac items=0 ppid=1703 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:43:27.354000 audit[1759]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.354000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2a037810 a2=0 a3=7ffc2a0377fc items=0 ppid=1703 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:43:27.355000 audit[1760]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.355000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd35891d0 a2=0 a3=7ffcd35891bc items=0 ppid=1703 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:43:27.357000 audit[1762]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.357000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde39d5de0 a2=0 a3=7ffde39d5dcc items=0 ppid=1703 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:43:27.361000 audit[1765]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.361000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd980890f0 a2=0 a3=7ffd980890dc items=0 ppid=1703 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:43:27.362000 audit[1766]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.362000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb8d7ec10 a2=0 a3=7ffcb8d7ebfc items=0 ppid=1703 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:43:27.364000 audit[1768]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.364000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd17d7c8b0 a2=0 a3=7ffd17d7c89c items=0 ppid=1703 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:43:27.365000 audit[1769]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.365000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff54f509a0 a2=0 a3=7fff54f5098c items=0 ppid=1703 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:43:27.369008 kubelet[1424]: E0209 19:43:27.368985 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:27.368000 audit[1771]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.368000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe18f99ff0 a2=0 a3=7ffe18f99fdc items=0 ppid=1703 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:43:27.375000 audit[1774]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.375000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1c1b5900 a2=0 a3=7ffe1c1b58ec items=0 ppid=1703 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:43:27.378000 audit[1777]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.378000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe11570120 a2=0 a3=7ffe1157010c items=0 ppid=1703 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:43:27.380000 audit[1778]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.380000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff01054a00 a2=0 a3=7fff010549ec items=0 ppid=1703 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:43:27.382000 audit[1780]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.382000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffce1603920 a2=0 a3=7ffce160390c items=0 ppid=1703 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:43:27.385000 audit[1783]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:43:27.385000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd95da4000 a2=0 a3=7ffd95da3fec items=0 ppid=1703 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:43:27.389000 audit[1787]: NETFILTER_CFG table=filter:58 family=2 entries=3 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:27.389000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff17af09d0 a2=0 a3=7fff17af09bc items=0 ppid=1703 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:27.399000 audit[1787]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:27.399000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff17af09d0 a2=0 a3=7fff17af09bc items=0 ppid=1703 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:27.410000 audit[1794]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.410000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffecb0817f0 a2=0 a3=7ffecb0817dc items=0 ppid=1703 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:43:27.412000 audit[1796]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.412000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff85d0f410 a2=0 a3=7fff85d0f3fc items=0 ppid=1703 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:43:27.415000 audit[1799]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.415000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc6802c010 a2=0 a3=7ffc6802bffc items=0 ppid=1703 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:43:27.416000 audit[1800]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.416000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5e1530f0 a2=0 a3=7fff5e1530dc items=0 ppid=1703 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:43:27.418000 audit[1802]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.418000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc285da0d0 a2=0 a3=7ffc285da0bc items=0 ppid=1703 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:43:27.419000 audit[1803]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.419000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed5002f00 a2=0 a3=7ffed5002eec items=0 ppid=1703 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:43:27.421000 audit[1805]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.421000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf03e9160 a2=0 a3=7ffdf03e914c items=0 ppid=1703 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:43:27.424000 audit[1808]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.424000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdd8c86700 a2=0 a3=7ffdd8c866ec items=0 ppid=1703 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:43:27.425000 audit[1809]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.425000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee68b1560 a2=0 a3=7ffee68b154c items=0 ppid=1703 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:43:27.427000 audit[1811]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.427000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd49c90ad0 a2=0 a3=7ffd49c90abc items=0 ppid=1703 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:43:27.428000 audit[1812]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.428000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff35262250 a2=0 a3=7fff3526223c items=0 ppid=1703 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:43:27.431000 audit[1814]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.431000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd325362a0 a2=0 a3=7ffd3253628c items=0 ppid=1703 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:43:27.433000 audit[1817]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.433000 audit[1817]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce0781110 a2=0 a3=7ffce07810fc items=0 ppid=1703 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:43:27.437000 audit[1820]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.437000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe46783580 a2=0 a3=7ffe4678356c items=0 ppid=1703 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:43:27.438000 audit[1821]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.438000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc8826b440 a2=0 a3=7ffc8826b42c items=0 ppid=1703 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:43:27.439000 audit[1823]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.439000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff336e8ca0 a2=0 a3=7fff336e8c8c items=0 ppid=1703 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:43:27.442000 audit[1826]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:43:27.442000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd2322ea0 a2=0 a3=7ffcd2322e8c items=0 ppid=1703 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:43:27.447000 audit[1830]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:43:27.447000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffffd3f97b0 a2=0 a3=7ffffd3f979c items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.447000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:27.448000 audit[1830]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:43:27.448000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffffd3f97b0 a2=0 a3=7ffffd3f979c items=0 ppid=1703 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:27.448000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:28.139466 systemd[1]: run-containerd-runc-k8s.io-3ebfcc149a8ac2d91199ef551158dbae955d834a7e4e55a89eef562e44054415-runc.A9ajMw.mount: Deactivated successfully. Feb 9 19:43:28.216578 kubelet[1424]: E0209 19:43:28.216515 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:28.270796 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1689866313.mount: Deactivated successfully. Feb 9 19:43:28.369974 kubelet[1424]: E0209 19:43:28.369943 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:29.217082 kubelet[1424]: E0209 19:43:29.216961 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:29.329982 kubelet[1424]: E0209 19:43:29.329330 1424 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:30.217340 kubelet[1424]: E0209 19:43:30.217281 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:31.217916 kubelet[1424]: E0209 19:43:31.217880 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:31.329335 kubelet[1424]: E0209 19:43:31.329289 1424 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:32.218956 kubelet[1424]: E0209 19:43:32.218875 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:33.102145 env[1115]: time="2024-02-09T19:43:33.102076139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:33.104001 env[1115]: time="2024-02-09T19:43:33.103921326Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:33.105545 env[1115]: time="2024-02-09T19:43:33.105513269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:33.107194 env[1115]: time="2024-02-09T19:43:33.107153836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:33.108081 env[1115]: time="2024-02-09T19:43:33.108046426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:43:33.109780 env[1115]: time="2024-02-09T19:43:33.109746395Z" level=info msg="CreateContainer within sandbox \"7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:43:33.122812 env[1115]: time="2024-02-09T19:43:33.122751117Z" level=info msg="CreateContainer within sandbox \"7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce\"" Feb 9 19:43:33.123329 env[1115]: time="2024-02-09T19:43:33.123294532Z" level=info msg="StartContainer for \"c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce\"" Feb 9 19:43:33.145951 systemd[1]: run-containerd-runc-k8s.io-c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce-runc.PMAXQr.mount: Deactivated successfully. Feb 9 19:43:33.148697 systemd[1]: Started cri-containerd-c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce.scope. Feb 9 19:43:33.167138 kernel: kauditd_printk_skb: 165 callbacks suppressed Feb 9 19:43:33.167276 kernel: audit: type=1400 audit(1707507813.159:670): avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.167307 kernel: audit: type=1300 audit(1707507813.159:670): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1549 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:33.167351 kernel: audit: type=1327 audit(1707507813.159:670): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393764643230626466643438376666633333613032353637613466 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1549 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:33.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393764643230626466643438376666633333613032353637613466 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.171028 kernel: audit: type=1400 audit(1707507813.159:671): avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.171078 kernel: audit: type=1400 audit(1707507813.159:671): avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.175028 kernel: audit: type=1400 audit(1707507813.159:671): avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.175082 kernel: audit: type=1400 audit(1707507813.159:671): avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.178921 kernel: audit: type=1400 audit(1707507813.159:671): avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.178979 kernel: audit: type=1400 audit(1707507813.159:671): avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.182867 kernel: audit: type=1400 audit(1707507813.159:671): avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.159000 audit: BPF prog-id=81 op=LOAD Feb 9 19:43:33.159000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003cc070 items=0 ppid=1549 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:33.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393764643230626466643438376666633333613032353637613466 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.162000 audit: BPF prog-id=82 op=LOAD Feb 9 19:43:33.162000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003cc0b8 items=0 ppid=1549 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:33.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393764643230626466643438376666633333613032353637613466 Feb 9 19:43:33.168000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:43:33.168000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { perfmon } for pid=1839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit[1839]: AVC avc: denied { bpf } for pid=1839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:33.168000 audit: BPF prog-id=83 op=LOAD Feb 9 19:43:33.168000 audit[1839]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003cc148 items=0 ppid=1549 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:33.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333393764643230626466643438376666633333613032353637613466 Feb 9 19:43:33.187102 env[1115]: time="2024-02-09T19:43:33.187058085Z" level=info msg="StartContainer for \"c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce\" returns successfully" Feb 9 19:43:33.219942 kubelet[1424]: E0209 19:43:33.219864 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:33.328967 kubelet[1424]: E0209 19:43:33.328930 1424 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:33.414706 kubelet[1424]: E0209 19:43:33.414615 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:33.462425 kubelet[1424]: I0209 19:43:33.462392 1424 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-sp7l4" podStartSLOduration=-9.223372017392426e+09 pod.CreationTimestamp="2024-02-09 19:43:14 +0000 UTC" firstStartedPulling="2024-02-09 19:43:21.936725725 +0000 UTC m=+21.310803962" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:43:27.378844847 +0000 UTC m=+26.752923094" watchObservedRunningTime="2024-02-09 19:43:33.462349633 +0000 UTC m=+32.836427880" Feb 9 19:43:34.220540 kubelet[1424]: E0209 19:43:34.220479 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:34.378428 env[1115]: time="2024-02-09T19:43:34.378354236Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:43:34.380685 systemd[1]: cri-containerd-c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce.scope: Deactivated successfully. Feb 9 19:43:34.385626 kubelet[1424]: I0209 19:43:34.385598 1424 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:43:34.388000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:43:34.398049 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce-rootfs.mount: Deactivated successfully. Feb 9 19:43:34.416766 kubelet[1424]: E0209 19:43:34.416731 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:35.072690 env[1115]: time="2024-02-09T19:43:35.072637700Z" level=info msg="shim disconnected" id=c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce Feb 9 19:43:35.072690 env[1115]: time="2024-02-09T19:43:35.072683988Z" level=warning msg="cleaning up after shim disconnected" id=c397dd20bdfd487ffc33a02567a4f3e537f95eed78c2539a7a32ef77e766d8ce namespace=k8s.io Feb 9 19:43:35.072690 env[1115]: time="2024-02-09T19:43:35.072693456Z" level=info msg="cleaning up dead shim" Feb 9 19:43:35.078656 env[1115]: time="2024-02-09T19:43:35.078609988Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:43:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1888 runtime=io.containerd.runc.v2\n" Feb 9 19:43:35.220892 kubelet[1424]: E0209 19:43:35.220833 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:35.332462 systemd[1]: Created slice kubepods-besteffort-podaf77093f_b116_4d38_b63b_04d9b5587b5c.slice. Feb 9 19:43:35.334222 env[1115]: time="2024-02-09T19:43:35.334187366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-szh6v,Uid:af77093f-b116-4d38-b63b-04d9b5587b5c,Namespace:calico-system,Attempt:0,}" Feb 9 19:43:35.379261 env[1115]: time="2024-02-09T19:43:35.379166328Z" level=error msg="Failed to destroy network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:35.379707 env[1115]: time="2024-02-09T19:43:35.379639849Z" level=error msg="encountered an error cleaning up failed sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:35.379759 env[1115]: time="2024-02-09T19:43:35.379701065Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-szh6v,Uid:af77093f-b116-4d38-b63b-04d9b5587b5c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:35.380070 kubelet[1424]: E0209 19:43:35.380029 1424 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:35.380174 kubelet[1424]: E0209 19:43:35.380133 1424 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-szh6v" Feb 9 19:43:35.380174 kubelet[1424]: E0209 19:43:35.380166 1424 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-szh6v" Feb 9 19:43:35.380311 kubelet[1424]: E0209 19:43:35.380253 1424 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-szh6v_calico-system(af77093f-b116-4d38-b63b-04d9b5587b5c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-szh6v_calico-system(af77093f-b116-4d38-b63b-04d9b5587b5c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:35.380842 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59-shm.mount: Deactivated successfully. Feb 9 19:43:35.418083 kubelet[1424]: I0209 19:43:35.418041 1424 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:43:35.418737 env[1115]: time="2024-02-09T19:43:35.418694334Z" level=info msg="StopPodSandbox for \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\"" Feb 9 19:43:35.419797 kubelet[1424]: E0209 19:43:35.419772 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:35.420384 env[1115]: time="2024-02-09T19:43:35.420360042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:43:35.443918 env[1115]: time="2024-02-09T19:43:35.443828866Z" level=error msg="StopPodSandbox for \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\" failed" error="failed to destroy network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:35.444332 kubelet[1424]: E0209 19:43:35.444303 1424 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:43:35.444426 kubelet[1424]: E0209 19:43:35.444395 1424 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59} Feb 9 19:43:35.444456 kubelet[1424]: E0209 19:43:35.444450 1424 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"af77093f-b116-4d38-b63b-04d9b5587b5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:43:35.444516 kubelet[1424]: E0209 19:43:35.444495 1424 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"af77093f-b116-4d38-b63b-04d9b5587b5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-szh6v" podUID=af77093f-b116-4d38-b63b-04d9b5587b5c Feb 9 19:43:36.221885 kubelet[1424]: E0209 19:43:36.221816 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:37.094451 kubelet[1424]: I0209 19:43:37.094369 1424 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:43:37.099942 systemd[1]: Created slice kubepods-besteffort-pod64086fee_2d45_447f_b625_9ab3fc23dc7f.slice. Feb 9 19:43:37.120333 kubelet[1424]: I0209 19:43:37.120280 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jbf5q\" (UniqueName: \"kubernetes.io/projected/64086fee-2d45-447f-b625-9ab3fc23dc7f-kube-api-access-jbf5q\") pod \"nginx-deployment-8ffc5cf85-t9bv7\" (UID: \"64086fee-2d45-447f-b625-9ab3fc23dc7f\") " pod="default/nginx-deployment-8ffc5cf85-t9bv7" Feb 9 19:43:37.222444 kubelet[1424]: E0209 19:43:37.222387 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:37.403575 env[1115]: time="2024-02-09T19:43:37.403415679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-t9bv7,Uid:64086fee-2d45-447f-b625-9ab3fc23dc7f,Namespace:default,Attempt:0,}" Feb 9 19:43:37.774393 env[1115]: time="2024-02-09T19:43:37.774209593Z" level=error msg="Failed to destroy network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:37.774909 env[1115]: time="2024-02-09T19:43:37.774869586Z" level=error msg="encountered an error cleaning up failed sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:37.774972 env[1115]: time="2024-02-09T19:43:37.774928388Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-t9bv7,Uid:64086fee-2d45-447f-b625-9ab3fc23dc7f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:37.775287 kubelet[1424]: E0209 19:43:37.775250 1424 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:37.775377 kubelet[1424]: E0209 19:43:37.775328 1424 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-t9bv7" Feb 9 19:43:37.775377 kubelet[1424]: E0209 19:43:37.775361 1424 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-t9bv7" Feb 9 19:43:37.775477 kubelet[1424]: E0209 19:43:37.775433 1424 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-t9bv7_default(64086fee-2d45-447f-b625-9ab3fc23dc7f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-t9bv7_default(64086fee-2d45-447f-b625-9ab3fc23dc7f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-t9bv7" podUID=64086fee-2d45-447f-b625-9ab3fc23dc7f Feb 9 19:43:37.775879 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d-shm.mount: Deactivated successfully. Feb 9 19:43:38.222922 kubelet[1424]: E0209 19:43:38.222856 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:38.425074 kubelet[1424]: I0209 19:43:38.425037 1424 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:43:38.425555 env[1115]: time="2024-02-09T19:43:38.425518405Z" level=info msg="StopPodSandbox for \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\"" Feb 9 19:43:38.445655 env[1115]: time="2024-02-09T19:43:38.445576638Z" level=error msg="StopPodSandbox for \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\" failed" error="failed to destroy network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:43:38.446029 kubelet[1424]: E0209 19:43:38.445891 1424 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:43:38.446029 kubelet[1424]: E0209 19:43:38.445938 1424 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d} Feb 9 19:43:38.446029 kubelet[1424]: E0209 19:43:38.445976 1424 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"64086fee-2d45-447f-b625-9ab3fc23dc7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:43:38.446029 kubelet[1424]: E0209 19:43:38.446007 1424 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"64086fee-2d45-447f-b625-9ab3fc23dc7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-t9bv7" podUID=64086fee-2d45-447f-b625-9ab3fc23dc7f Feb 9 19:43:39.223388 kubelet[1424]: E0209 19:43:39.223309 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:40.224180 kubelet[1424]: E0209 19:43:40.224078 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:41.153068 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2430278518.mount: Deactivated successfully. Feb 9 19:43:41.201495 kubelet[1424]: E0209 19:43:41.201458 1424 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:41.224670 kubelet[1424]: E0209 19:43:41.224608 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:41.514185 update_engine[1105]: I0209 19:43:41.513958 1105 update_attempter.cc:509] Updating boot flags... Feb 9 19:43:41.796630 env[1115]: time="2024-02-09T19:43:41.796495481Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:41.799076 env[1115]: time="2024-02-09T19:43:41.799035359Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:41.801337 env[1115]: time="2024-02-09T19:43:41.801296990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:41.803917 env[1115]: time="2024-02-09T19:43:41.803869771Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:41.804279 env[1115]: time="2024-02-09T19:43:41.804234512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:43:41.818216 env[1115]: time="2024-02-09T19:43:41.818088190Z" level=info msg="CreateContainer within sandbox \"7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:43:41.833862 env[1115]: time="2024-02-09T19:43:41.833801729Z" level=info msg="CreateContainer within sandbox \"7b4bd12805047f633321ff3c6729f41b4a3110293fe32abcd82f63da580673d7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e74df53304d2d02df73ba584cd342592621ac80081c8f83d807d74b4742b0544\"" Feb 9 19:43:41.834498 env[1115]: time="2024-02-09T19:43:41.834457391Z" level=info msg="StartContainer for \"e74df53304d2d02df73ba584cd342592621ac80081c8f83d807d74b4742b0544\"" Feb 9 19:43:41.878141 systemd[1]: Started cri-containerd-e74df53304d2d02df73ba584cd342592621ac80081c8f83d807d74b4742b0544.scope. Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.893420 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:43:41.893516 kernel: audit: type=1400 audit(1707507821.891:677): avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1549 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:41.899094 kernel: audit: type=1300 audit(1707507821.891:677): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1549 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:41.899208 kernel: audit: type=1327 audit(1707507821.891:677): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537346466353333303464326430326466373362613538346364333432 Feb 9 19:43:41.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537346466353333303464326430326466373362613538346364333432 Feb 9 19:43:41.903152 kernel: audit: type=1400 audit(1707507821.891:678): avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.907687 kernel: audit: type=1400 audit(1707507821.891:678): avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.907733 kernel: audit: type=1400 audit(1707507821.891:678): avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.913159 kernel: audit: type=1400 audit(1707507821.891:678): avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.913251 kernel: audit: type=1400 audit(1707507821.891:678): avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.918616 kernel: audit: type=1400 audit(1707507821.891:678): avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.918671 kernel: audit: type=1400 audit(1707507821.891:678): avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.891000 audit: BPF prog-id=84 op=LOAD Feb 9 19:43:41.891000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00039ca30 items=0 ppid=1549 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:41.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537346466353333303464326430326466373362613538346364333432 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.894000 audit: BPF prog-id=85 op=LOAD Feb 9 19:43:41.894000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00039ca78 items=0 ppid=1549 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:41.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537346466353333303464326430326466373362613538346364333432 Feb 9 19:43:41.901000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:43:41.901000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { perfmon } for pid=2046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit[2046]: AVC avc: denied { bpf } for pid=2046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:41.901000 audit: BPF prog-id=86 op=LOAD Feb 9 19:43:41.901000 audit[2046]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00039cb08 items=0 ppid=1549 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:41.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537346466353333303464326430326466373362613538346364333432 Feb 9 19:43:41.926367 env[1115]: time="2024-02-09T19:43:41.926313585Z" level=info msg="StartContainer for \"e74df53304d2d02df73ba584cd342592621ac80081c8f83d807d74b4742b0544\" returns successfully" Feb 9 19:43:41.993282 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:43:41.993479 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:43:42.225473 kubelet[1424]: E0209 19:43:42.225382 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:42.434097 kubelet[1424]: E0209 19:43:42.434064 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:42.443746 kubelet[1424]: I0209 19:43:42.443728 1424 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-xdq4s" podStartSLOduration=-9.223372008411077e+09 pod.CreationTimestamp="2024-02-09 19:43:14 +0000 UTC" firstStartedPulling="2024-02-09 19:43:21.93238713 +0000 UTC m=+21.306465377" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:43:42.443381796 +0000 UTC m=+41.817460043" watchObservedRunningTime="2024-02-09 19:43:42.443698877 +0000 UTC m=+41.817777124" Feb 9 19:43:43.190000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=19346 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:43:43.190000 audit[2171]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde3b67980 a2=241 a3=1b6 items=1 ppid=2136 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.190000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:43:43.190000 audit: PATH item=0 name="/dev/fd/63" inode=20507 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:43:43.190000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:43:43.202000 audit[2179]: AVC avc: denied { write } for pid=2179 comm="tee" name="fd" dev="proc" ino=21525 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:43:43.202000 audit[2179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe35e2e991 a2=241 a3=1b6 items=1 ppid=2152 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.202000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:43:43.202000 audit: PATH item=0 name="/dev/fd/63" inode=21520 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:43:43.202000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:43:43.204000 audit[2191]: AVC avc: denied { write } for pid=2191 comm="tee" name="fd" dev="proc" ino=20515 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:43:43.204000 audit[2191]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc777d990 a2=241 a3=1b6 items=1 ppid=2137 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.204000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:43:43.204000 audit: PATH item=0 name="/dev/fd/63" inode=20512 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:43:43.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:43:43.212000 audit[2197]: AVC avc: denied { write } for pid=2197 comm="tee" name="fd" dev="proc" ino=19942 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:43:43.212000 audit[2197]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcdd71298f a2=241 a3=1b6 items=1 ppid=2135 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.212000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:43:43.212000 audit: PATH item=0 name="/dev/fd/63" inode=19934 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:43:43.213000 audit[2207]: AVC avc: denied { write } for pid=2207 comm="tee" name="fd" dev="proc" ino=19359 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:43:43.213000 audit[2207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4c57598f a2=241 a3=1b6 items=1 ppid=2147 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.213000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:43:43.213000 audit: PATH item=0 name="/dev/fd/63" inode=20521 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:43:43.213000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:43:43.212000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:43:43.216000 audit[2205]: AVC avc: denied { write } for pid=2205 comm="tee" name="fd" dev="proc" ino=21532 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:43:43.216000 audit[2205]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2e09197f a2=241 a3=1b6 items=1 ppid=2145 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.216000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:43:43.216000 audit: PATH item=0 name="/dev/fd/63" inode=21529 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:43:43.216000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:43:43.223000 audit[2213]: AVC avc: denied { write } for pid=2213 comm="tee" name="fd" dev="proc" ino=21541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:43:43.223000 audit[2213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb337998f a2=241 a3=1b6 items=1 ppid=2150 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.223000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:43:43.223000 audit: PATH item=0 name="/dev/fd/63" inode=19944 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:43:43.223000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:43:43.226607 kubelet[1424]: E0209 19:43:43.226557 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:43.297143 kernel: Initializing XFRM netlink socket Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.367000 audit: BPF prog-id=87 op=LOAD Feb 9 19:43:43.367000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd36ee68e0 a2=70 a3=7f0d600b4000 items=0 ppid=2138 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.367000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:43:43.368000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.368000 audit: BPF prog-id=88 op=LOAD Feb 9 19:43:43.368000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd36ee68e0 a2=70 a3=6e items=0 ppid=2138 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.368000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:43:43.369000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd36ee6890 a2=70 a3=7ffd36ee68e0 items=0 ppid=2138 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.369000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.369000 audit: BPF prog-id=89 op=LOAD Feb 9 19:43:43.369000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd36ee6870 a2=70 a3=7ffd36ee68e0 items=0 ppid=2138 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.369000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:43:43.370000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:43:43.370000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.370000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd36ee6950 a2=70 a3=0 items=0 ppid=2138 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.370000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:43:43.371000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.371000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd36ee6940 a2=70 a3=0 items=0 ppid=2138 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.371000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:43:43.371000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.371000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd36ee6980 a2=70 a3=0 items=0 ppid=2138 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.371000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.372000 audit: BPF prog-id=90 op=LOAD Feb 9 19:43:43.372000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd36ee68a0 a2=70 a3=ffffffff items=0 ppid=2138 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.372000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:43:43.376000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.376000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd3e2db470 a2=70 a3=208 items=0 ppid=2138 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:43:43.376000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:43.376000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd3e2db340 a2=70 a3=3 items=0 ppid=2138 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:43:43.374000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:43:43.374000 audit[1176]: SYSCALL arch=c000003e syscall=232 success=yes exit=1 a0=5 a1=55d3334c3660 a2=20 a3=ffffffff items=0 ppid=1 pid=1176 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:43:43.415000 audit[2308]: NETFILTER_CFG table=mangle:79 family=2 entries=19 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:43:43.415000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd8e347380 a2=0 a3=7ffd8e34736c items=0 ppid=2138 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.415000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:43:43.416000 audit[2309]: NETFILTER_CFG table=raw:80 family=2 entries=19 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:43:43.416000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffddc14c410 a2=0 a3=557e3c124000 items=0 ppid=2138 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.416000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:43:43.420000 audit[2310]: NETFILTER_CFG table=filter:81 family=2 entries=39 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:43:43.420000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe007188b0 a2=0 a3=5605bb02f000 items=0 ppid=2138 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.420000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:43:43.420000 audit[2311]: NETFILTER_CFG table=nat:82 family=2 entries=16 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:43:43.420000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffbdef65c0 a2=0 a3=55f147a50000 items=0 ppid=2138 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:43.420000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:43:43.435956 kubelet[1424]: E0209 19:43:43.435925 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:43.452993 systemd[1]: run-containerd-runc-k8s.io-e74df53304d2d02df73ba584cd342592621ac80081c8f83d807d74b4742b0544-runc.iZZrMI.mount: Deactivated successfully. Feb 9 19:43:44.227667 kubelet[1424]: E0209 19:43:44.227610 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:44.309426 systemd-networkd[1016]: vxlan.calico: Link UP Feb 9 19:43:44.309435 systemd-networkd[1016]: vxlan.calico: Gained carrier Feb 9 19:43:45.228639 kubelet[1424]: E0209 19:43:45.228582 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:45.457343 systemd-networkd[1016]: vxlan.calico: Gained IPv6LL Feb 9 19:43:46.229638 kubelet[1424]: E0209 19:43:46.229578 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:46.328834 env[1115]: time="2024-02-09T19:43:46.328776767Z" level=info msg="StopPodSandbox for \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\"" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.364 [INFO][2361] k8s.go 578: Cleaning up netns ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.364 [INFO][2361] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" iface="eth0" netns="/var/run/netns/cni-e6e77c01-d4fe-3431-f0a1-5db4a0ec36f8" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.364 [INFO][2361] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" iface="eth0" netns="/var/run/netns/cni-e6e77c01-d4fe-3431-f0a1-5db4a0ec36f8" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.364 [INFO][2361] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" iface="eth0" netns="/var/run/netns/cni-e6e77c01-d4fe-3431-f0a1-5db4a0ec36f8" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.365 [INFO][2361] k8s.go 585: Releasing IP address(es) ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.365 [INFO][2361] utils.go 188: Calico CNI releasing IP address ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.381 [INFO][2369] ipam_plugin.go 415: Releasing address using handleID ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.381 [INFO][2369] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.381 [INFO][2369] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.387 [WARNING][2369] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.387 [INFO][2369] ipam_plugin.go 443: Releasing address using workloadID ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.389 [INFO][2369] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:43:46.390782 env[1115]: 2024-02-09 19:43:46.389 [INFO][2361] k8s.go 591: Teardown processing complete. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:43:46.391300 env[1115]: time="2024-02-09T19:43:46.390945024Z" level=info msg="TearDown network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\" successfully" Feb 9 19:43:46.391300 env[1115]: time="2024-02-09T19:43:46.390985980Z" level=info msg="StopPodSandbox for \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\" returns successfully" Feb 9 19:43:46.391739 env[1115]: time="2024-02-09T19:43:46.391704147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-szh6v,Uid:af77093f-b116-4d38-b63b-04d9b5587b5c,Namespace:calico-system,Attempt:1,}" Feb 9 19:43:46.392169 systemd[1]: run-netns-cni\x2de6e77c01\x2dd4fe\x2d3431\x2df0a1\x2d5db4a0ec36f8.mount: Deactivated successfully. Feb 9 19:43:47.087593 systemd-networkd[1016]: cali30a9478858b: Link UP Feb 9 19:43:47.089296 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:43:47.089368 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali30a9478858b: link becomes ready Feb 9 19:43:47.089239 systemd-networkd[1016]: cali30a9478858b: Gained carrier Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.035 [INFO][2382] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.48-k8s-csi--node--driver--szh6v-eth0 csi-node-driver- calico-system af77093f-b116-4d38-b63b-04d9b5587b5c 956 0 2024-02-09 19:43:14 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.48 csi-node-driver-szh6v eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali30a9478858b [] []}} ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Namespace="calico-system" Pod="csi-node-driver-szh6v" WorkloadEndpoint="10.0.0.48-k8s-csi--node--driver--szh6v-" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.035 [INFO][2382] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Namespace="calico-system" Pod="csi-node-driver-szh6v" WorkloadEndpoint="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.056 [INFO][2391] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" HandleID="k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.065 [INFO][2391] ipam_plugin.go 268: Auto assigning IP ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" HandleID="k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025dcf0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.48", "pod":"csi-node-driver-szh6v", "timestamp":"2024-02-09 19:43:47.056476882 +0000 UTC"}, Hostname:"10.0.0.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.065 [INFO][2391] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.065 [INFO][2391] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.065 [INFO][2391] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.48' Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.066 [INFO][2391] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.069 [INFO][2391] ipam.go 372: Looking up existing affinities for host host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.073 [INFO][2391] ipam.go 489: Trying affinity for 192.168.70.192/26 host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.074 [INFO][2391] ipam.go 155: Attempting to load block cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.076 [INFO][2391] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.076 [INFO][2391] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.192/26 handle="k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.077 [INFO][2391] ipam.go 1682: Creating new handle: k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.080 [INFO][2391] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.192/26 handle="k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.083 [INFO][2391] ipam.go 1216: Successfully claimed IPs: [192.168.70.193/26] block=192.168.70.192/26 handle="k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.083 [INFO][2391] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.193/26] handle="k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" host="10.0.0.48" Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.083 [INFO][2391] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:43:47.097598 env[1115]: 2024-02-09 19:43:47.084 [INFO][2391] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.193/26] IPv6=[] ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" HandleID="k8s-pod-network.5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:47.098338 env[1115]: 2024-02-09 19:43:47.085 [INFO][2382] k8s.go 385: Populated endpoint ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Namespace="calico-system" Pod="csi-node-driver-szh6v" WorkloadEndpoint="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-csi--node--driver--szh6v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"af77093f-b116-4d38-b63b-04d9b5587b5c", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"", Pod:"csi-node-driver-szh6v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali30a9478858b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:43:47.098338 env[1115]: 2024-02-09 19:43:47.085 [INFO][2382] k8s.go 386: Calico CNI using IPs: [192.168.70.193/32] ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Namespace="calico-system" Pod="csi-node-driver-szh6v" WorkloadEndpoint="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:47.098338 env[1115]: 2024-02-09 19:43:47.085 [INFO][2382] dataplane_linux.go 68: Setting the host side veth name to cali30a9478858b ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Namespace="calico-system" Pod="csi-node-driver-szh6v" WorkloadEndpoint="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:47.098338 env[1115]: 2024-02-09 19:43:47.089 [INFO][2382] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Namespace="calico-system" Pod="csi-node-driver-szh6v" WorkloadEndpoint="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:47.098338 env[1115]: 2024-02-09 19:43:47.089 [INFO][2382] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Namespace="calico-system" Pod="csi-node-driver-szh6v" WorkloadEndpoint="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-csi--node--driver--szh6v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"af77093f-b116-4d38-b63b-04d9b5587b5c", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a", Pod:"csi-node-driver-szh6v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali30a9478858b", MAC:"fa:4d:b7:2d:44:c9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:43:47.098338 env[1115]: 2024-02-09 19:43:47.096 [INFO][2382] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a" Namespace="calico-system" Pod="csi-node-driver-szh6v" WorkloadEndpoint="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:43:47.107000 audit[2415]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:43:47.109132 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 9 19:43:47.109209 kernel: audit: type=1325 audit(1707507827.107:708): table=filter:83 family=2 entries=36 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:43:47.110841 env[1115]: time="2024-02-09T19:43:47.110789180Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:43:47.110841 env[1115]: time="2024-02-09T19:43:47.110822914Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:43:47.110841 env[1115]: time="2024-02-09T19:43:47.110832552Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:43:47.111024 env[1115]: time="2024-02-09T19:43:47.110962887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a pid=2424 runtime=io.containerd.runc.v2 Feb 9 19:43:47.107000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc59667260 a2=0 a3=7ffc5966724c items=0 ppid=2138 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:47.115076 kernel: audit: type=1300 audit(1707507827.107:708): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc59667260 a2=0 a3=7ffc5966724c items=0 ppid=2138 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:47.115188 kernel: audit: type=1327 audit(1707507827.107:708): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:43:47.107000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:43:47.120702 systemd[1]: Started cri-containerd-5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a.scope. Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.134367 kernel: audit: type=1400 audit(1707507827.129:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.134431 kernel: audit: type=1400 audit(1707507827.129:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.134464 kernel: audit: type=1400 audit(1707507827.129:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.138434 kernel: audit: type=1400 audit(1707507827.129:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.138477 kernel: audit: type=1400 audit(1707507827.129:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.142446 kernel: audit: type=1400 audit(1707507827.129:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.142494 kernel: audit: type=1400 audit(1707507827.129:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit: BPF prog-id=91 op=LOAD Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2424 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:47.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566396230313036643335313235383863343864666364633565306332 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2424 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:47.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566396230313036643335313235383863343864666364633565306332 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.133000 audit: BPF prog-id=92 op=LOAD Feb 9 19:43:47.133000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003b69c0 items=0 ppid=2424 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:47.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566396230313036643335313235383863343864666364633565306332 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.135000 audit: BPF prog-id=93 op=LOAD Feb 9 19:43:47.135000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003b6a08 items=0 ppid=2424 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:47.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566396230313036643335313235383863343864666364633565306332 Feb 9 19:43:47.137000 audit: BPF prog-id=93 op=UNLOAD Feb 9 19:43:47.137000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:47.137000 audit: BPF prog-id=94 op=LOAD Feb 9 19:43:47.137000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003b6e18 items=0 ppid=2424 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:47.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566396230313036643335313235383863343864666364633565306332 Feb 9 19:43:47.144623 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:43:47.153722 env[1115]: time="2024-02-09T19:43:47.153671745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-szh6v,Uid:af77093f-b116-4d38-b63b-04d9b5587b5c,Namespace:calico-system,Attempt:1,} returns sandbox id \"5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a\"" Feb 9 19:43:47.154788 env[1115]: time="2024-02-09T19:43:47.154758656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:43:47.230334 kubelet[1424]: E0209 19:43:47.230283 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:48.231190 kubelet[1424]: E0209 19:43:48.231075 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:48.721313 systemd-networkd[1016]: cali30a9478858b: Gained IPv6LL Feb 9 19:43:49.231953 kubelet[1424]: E0209 19:43:49.231914 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:49.234081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount244745789.mount: Deactivated successfully. Feb 9 19:43:50.233045 kubelet[1424]: E0209 19:43:50.232984 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:50.642421 env[1115]: time="2024-02-09T19:43:50.642355945Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:50.644188 env[1115]: time="2024-02-09T19:43:50.644154686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:50.646045 env[1115]: time="2024-02-09T19:43:50.645991579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:50.647658 env[1115]: time="2024-02-09T19:43:50.647626420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:50.648294 env[1115]: time="2024-02-09T19:43:50.648263071Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:43:50.650014 env[1115]: time="2024-02-09T19:43:50.649989165Z" level=info msg="CreateContainer within sandbox \"5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:43:50.664335 env[1115]: time="2024-02-09T19:43:50.664279445Z" level=info msg="CreateContainer within sandbox \"5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"10948c3e071b38c4e7f91a4eb8605246b5db7941b45a4a63bfdcbe9ba30fb8da\"" Feb 9 19:43:50.664779 env[1115]: time="2024-02-09T19:43:50.664752035Z" level=info msg="StartContainer for \"10948c3e071b38c4e7f91a4eb8605246b5db7941b45a4a63bfdcbe9ba30fb8da\"" Feb 9 19:43:50.683921 systemd[1]: Started cri-containerd-10948c3e071b38c4e7f91a4eb8605246b5db7941b45a4a63bfdcbe9ba30fb8da.scope. Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2424 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393438633365303731623338633465376639316134656238363035 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit: BPF prog-id=95 op=LOAD Feb 9 19:43:50.699000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000183620 items=0 ppid=2424 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393438633365303731623338633465376639316134656238363035 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit: BPF prog-id=96 op=LOAD Feb 9 19:43:50.699000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000183668 items=0 ppid=2424 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393438633365303731623338633465376639316134656238363035 Feb 9 19:43:50.699000 audit: BPF prog-id=96 op=UNLOAD Feb 9 19:43:50.699000 audit: BPF prog-id=95 op=UNLOAD Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { perfmon } for pid=2472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit[2472]: AVC avc: denied { bpf } for pid=2472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:50.699000 audit: BPF prog-id=97 op=LOAD Feb 9 19:43:50.699000 audit[2472]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001836f8 items=0 ppid=2424 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:50.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393438633365303731623338633465376639316134656238363035 Feb 9 19:43:50.715297 env[1115]: time="2024-02-09T19:43:50.714559292Z" level=info msg="StartContainer for \"10948c3e071b38c4e7f91a4eb8605246b5db7941b45a4a63bfdcbe9ba30fb8da\" returns successfully" Feb 9 19:43:50.715954 env[1115]: time="2024-02-09T19:43:50.715921370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:43:51.233615 kubelet[1424]: E0209 19:43:51.233565 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:52.234798 kubelet[1424]: E0209 19:43:52.234725 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:53.219177 env[1115]: time="2024-02-09T19:43:53.219095300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:53.234962 kubelet[1424]: E0209 19:43:53.234913 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:53.329001 env[1115]: time="2024-02-09T19:43:53.328939571Z" level=info msg="StopPodSandbox for \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\"" Feb 9 19:43:53.330857 env[1115]: time="2024-02-09T19:43:53.330828068Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:53.384143 env[1115]: time="2024-02-09T19:43:53.384069222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.379 [INFO][2519] k8s.go 578: Cleaning up netns ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.379 [INFO][2519] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" iface="eth0" netns="/var/run/netns/cni-418fad81-9285-03fc-4fee-2c996d0caaf8" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.379 [INFO][2519] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" iface="eth0" netns="/var/run/netns/cni-418fad81-9285-03fc-4fee-2c996d0caaf8" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.379 [INFO][2519] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" iface="eth0" netns="/var/run/netns/cni-418fad81-9285-03fc-4fee-2c996d0caaf8" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.379 [INFO][2519] k8s.go 585: Releasing IP address(es) ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.379 [INFO][2519] utils.go 188: Calico CNI releasing IP address ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.395 [INFO][2527] ipam_plugin.go 415: Releasing address using handleID ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.395 [INFO][2527] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.395 [INFO][2527] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.401 [WARNING][2527] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.401 [INFO][2527] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.403 [INFO][2527] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:43:53.404857 env[1115]: 2024-02-09 19:43:53.403 [INFO][2519] k8s.go 591: Teardown processing complete. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:43:53.405347 env[1115]: time="2024-02-09T19:43:53.405053734Z" level=info msg="TearDown network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\" successfully" Feb 9 19:43:53.405347 env[1115]: time="2024-02-09T19:43:53.405117354Z" level=info msg="StopPodSandbox for \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\" returns successfully" Feb 9 19:43:53.406279 systemd[1]: run-netns-cni\x2d418fad81\x2d9285\x2d03fc\x2d4fee\x2d2c996d0caaf8.mount: Deactivated successfully. Feb 9 19:43:53.406887 env[1115]: time="2024-02-09T19:43:53.406867581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-t9bv7,Uid:64086fee-2d45-447f-b625-9ab3fc23dc7f,Namespace:default,Attempt:1,}" Feb 9 19:43:53.417129 env[1115]: time="2024-02-09T19:43:53.417064715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:53.417636 env[1115]: time="2024-02-09T19:43:53.417615733Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:43:53.418900 env[1115]: time="2024-02-09T19:43:53.418869746Z" level=info msg="CreateContainer within sandbox \"5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:43:53.455019 env[1115]: time="2024-02-09T19:43:53.454978201Z" level=info msg="CreateContainer within sandbox \"5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0c4214cea440fbd0a6e98a4054c30caaf36fb866bcc5a6358cfbdd0c43951edc\"" Feb 9 19:43:53.455594 env[1115]: time="2024-02-09T19:43:53.455563774Z" level=info msg="StartContainer for \"0c4214cea440fbd0a6e98a4054c30caaf36fb866bcc5a6358cfbdd0c43951edc\"" Feb 9 19:43:53.472032 systemd[1]: Started cri-containerd-0c4214cea440fbd0a6e98a4054c30caaf36fb866bcc5a6358cfbdd0c43951edc.scope. Feb 9 19:43:53.487131 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 9 19:43:53.487231 kernel: audit: type=1400 audit(1707507833.484:733): avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2424 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.493213 kernel: audit: type=1300 audit(1707507833.484:733): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2424 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.493279 kernel: audit: type=1327 audit(1707507833.484:733): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343231346365613434306662643061366539386134303534633330 Feb 9 19:43:53.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343231346365613434306662643061366539386134303534633330 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.499464 kernel: audit: type=1400 audit(1707507833.484:734): avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.501973 kernel: audit: type=1400 audit(1707507833.484:734): avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.502028 kernel: audit: type=1400 audit(1707507833.484:734): avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.507029 kernel: audit: type=1400 audit(1707507833.484:734): avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.512558 kernel: audit: type=1400 audit(1707507833.484:734): avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.512609 kernel: audit: type=1400 audit(1707507833.484:734): avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.512630 kernel: audit: type=1400 audit(1707507833.484:734): avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.484000 audit: BPF prog-id=98 op=LOAD Feb 9 19:43:53.484000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ae3a0 items=0 ppid=2424 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343231346365613434306662643061366539386134303534633330 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.488000 audit: BPF prog-id=99 op=LOAD Feb 9 19:43:53.488000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ae3e8 items=0 ppid=2424 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343231346365613434306662643061366539386134303534633330 Feb 9 19:43:53.492000 audit: BPF prog-id=99 op=UNLOAD Feb 9 19:43:53.492000 audit: BPF prog-id=98 op=UNLOAD Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.492000 audit: BPF prog-id=100 op=LOAD Feb 9 19:43:53.492000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ae478 items=0 ppid=2424 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063343231346365613434306662643061366539386134303534633330 Feb 9 19:43:53.523587 env[1115]: time="2024-02-09T19:43:53.523550151Z" level=info msg="StartContainer for \"0c4214cea440fbd0a6e98a4054c30caaf36fb866bcc5a6358cfbdd0c43951edc\" returns successfully" Feb 9 19:43:53.545395 systemd-networkd[1016]: calie809fa8567b: Link UP Feb 9 19:43:53.546712 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:43:53.546762 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie809fa8567b: link becomes ready Feb 9 19:43:53.546955 systemd-networkd[1016]: calie809fa8567b: Gained carrier Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.476 [INFO][2542] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0 nginx-deployment-8ffc5cf85- default 64086fee-2d45-447f-b625-9ab3fc23dc7f 982 0 2024-02-09 19:43:37 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.48 nginx-deployment-8ffc5cf85-t9bv7 eth0 default [] [] [kns.default ksa.default.default] calie809fa8567b [] []}} ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t9bv7" WorkloadEndpoint="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.477 [INFO][2542] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t9bv7" WorkloadEndpoint="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.511 [INFO][2581] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" HandleID="k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.522 [INFO][2581] ipam_plugin.go 268: Auto assigning IP ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" HandleID="k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000246cb0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.48", "pod":"nginx-deployment-8ffc5cf85-t9bv7", "timestamp":"2024-02-09 19:43:53.511430795 +0000 UTC"}, Hostname:"10.0.0.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.522 [INFO][2581] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.522 [INFO][2581] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.522 [INFO][2581] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.48' Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.523 [INFO][2581] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.526 [INFO][2581] ipam.go 372: Looking up existing affinities for host host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.531 [INFO][2581] ipam.go 489: Trying affinity for 192.168.70.192/26 host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.532 [INFO][2581] ipam.go 155: Attempting to load block cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.534 [INFO][2581] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.534 [INFO][2581] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.192/26 handle="k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.535 [INFO][2581] ipam.go 1682: Creating new handle: k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17 Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.539 [INFO][2581] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.192/26 handle="k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.542 [INFO][2581] ipam.go 1216: Successfully claimed IPs: [192.168.70.194/26] block=192.168.70.192/26 handle="k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.542 [INFO][2581] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.194/26] handle="k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" host="10.0.0.48" Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.542 [INFO][2581] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:43:53.553325 env[1115]: 2024-02-09 19:43:53.542 [INFO][2581] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.194/26] IPv6=[] ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" HandleID="k8s-pod-network.fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.554125 env[1115]: 2024-02-09 19:43:53.543 [INFO][2542] k8s.go 385: Populated endpoint ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t9bv7" WorkloadEndpoint="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"64086fee-2d45-447f-b625-9ab3fc23dc7f", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-t9bv7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie809fa8567b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:43:53.554125 env[1115]: 2024-02-09 19:43:53.543 [INFO][2542] k8s.go 386: Calico CNI using IPs: [192.168.70.194/32] ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t9bv7" WorkloadEndpoint="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.554125 env[1115]: 2024-02-09 19:43:53.544 [INFO][2542] dataplane_linux.go 68: Setting the host side veth name to calie809fa8567b ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t9bv7" WorkloadEndpoint="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.554125 env[1115]: 2024-02-09 19:43:53.546 [INFO][2542] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t9bv7" WorkloadEndpoint="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.554125 env[1115]: 2024-02-09 19:43:53.547 [INFO][2542] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t9bv7" WorkloadEndpoint="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"64086fee-2d45-447f-b625-9ab3fc23dc7f", ResourceVersion:"982", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17", Pod:"nginx-deployment-8ffc5cf85-t9bv7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie809fa8567b", MAC:"5e:51:56:ef:e9:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:43:53.554125 env[1115]: 2024-02-09 19:43:53.552 [INFO][2542] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17" Namespace="default" Pod="nginx-deployment-8ffc5cf85-t9bv7" WorkloadEndpoint="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:43:53.569573 env[1115]: time="2024-02-09T19:43:53.569500914Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:43:53.569573 env[1115]: time="2024-02-09T19:43:53.569569413Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:43:53.569734 env[1115]: time="2024-02-09T19:43:53.569591845Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:43:53.569778 env[1115]: time="2024-02-09T19:43:53.569735756Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17 pid=2629 runtime=io.containerd.runc.v2 Feb 9 19:43:53.568000 audit[2628]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=2628 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:43:53.568000 audit[2628]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffeebda81c0 a2=0 a3=7ffeebda81ac items=0 ppid=2138 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.568000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:43:53.579984 systemd[1]: Started cri-containerd-fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17.scope. Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit: BPF prog-id=101 op=LOAD Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2629 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623861363935323138616263383665373639613237656331663137 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2629 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623861363935323138616263383665373639613237656331663137 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit: BPF prog-id=102 op=LOAD Feb 9 19:43:53.588000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000996c0 items=0 ppid=2629 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623861363935323138616263383665373639613237656331663137 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.588000 audit: BPF prog-id=103 op=LOAD Feb 9 19:43:53.588000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099708 items=0 ppid=2629 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623861363935323138616263383665373639613237656331663137 Feb 9 19:43:53.589000 audit: BPF prog-id=103 op=UNLOAD Feb 9 19:43:53.589000 audit: BPF prog-id=102 op=UNLOAD Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:53.589000 audit: BPF prog-id=104 op=LOAD Feb 9 19:43:53.589000 audit[2638]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099b18 items=0 ppid=2629 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:53.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623861363935323138616263383665373639613237656331663137 Feb 9 19:43:53.590728 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:43:53.611856 env[1115]: time="2024-02-09T19:43:53.611804759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-t9bv7,Uid:64086fee-2d45-447f-b625-9ab3fc23dc7f,Namespace:default,Attempt:1,} returns sandbox id \"fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17\"" Feb 9 19:43:53.612964 env[1115]: time="2024-02-09T19:43:53.612945507Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:43:54.235843 kubelet[1424]: E0209 19:43:54.235790 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:54.393837 kubelet[1424]: I0209 19:43:54.393802 1424 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:43:54.393837 kubelet[1424]: I0209 19:43:54.393851 1424 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:43:54.549001 kubelet[1424]: I0209 19:43:54.548565 1424 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-szh6v" podStartSLOduration=-9.223371996306265e+09 pod.CreationTimestamp="2024-02-09 19:43:14 +0000 UTC" firstStartedPulling="2024-02-09 19:43:47.154575862 +0000 UTC m=+46.528654109" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:43:54.548371611 +0000 UTC m=+53.922449858" watchObservedRunningTime="2024-02-09 19:43:54.548510633 +0000 UTC m=+53.922588880" Feb 9 19:43:55.236488 kubelet[1424]: E0209 19:43:55.236420 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:55.314420 systemd-networkd[1016]: calie809fa8567b: Gained IPv6LL Feb 9 19:43:56.237620 kubelet[1424]: E0209 19:43:56.237551 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:56.696708 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2628601792.mount: Deactivated successfully. Feb 9 19:43:57.026691 systemd[1]: run-containerd-runc-k8s.io-e74df53304d2d02df73ba584cd342592621ac80081c8f83d807d74b4742b0544-runc.P0V3gK.mount: Deactivated successfully. Feb 9 19:43:57.069331 kubelet[1424]: E0209 19:43:57.069299 1424 dns.go:156] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 9 19:43:57.238591 kubelet[1424]: E0209 19:43:57.238554 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:58.040723 env[1115]: time="2024-02-09T19:43:58.040666074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:58.042508 env[1115]: time="2024-02-09T19:43:58.042455489Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:58.043918 env[1115]: time="2024-02-09T19:43:58.043879388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:58.045457 env[1115]: time="2024-02-09T19:43:58.045421048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:43:58.046096 env[1115]: time="2024-02-09T19:43:58.046065520Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:43:58.047684 env[1115]: time="2024-02-09T19:43:58.047655180Z" level=info msg="CreateContainer within sandbox \"fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 19:43:58.058042 env[1115]: time="2024-02-09T19:43:58.057997335Z" level=info msg="CreateContainer within sandbox \"fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"4a0acb4433877a0f2d04111fb441cda3fa078f0fb084894e119126c886eb6f18\"" Feb 9 19:43:58.058446 env[1115]: time="2024-02-09T19:43:58.058418107Z" level=info msg="StartContainer for \"4a0acb4433877a0f2d04111fb441cda3fa078f0fb084894e119126c886eb6f18\"" Feb 9 19:43:58.075955 systemd[1]: Started cri-containerd-4a0acb4433877a0f2d04111fb441cda3fa078f0fb084894e119126c886eb6f18.scope. Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.092000 audit: BPF prog-id=105 op=LOAD Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2629 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:58.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306163623434333338373761306632643034313131666234343163 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2629 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:58.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306163623434333338373761306632643034313131666234343163 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit: BPF prog-id=106 op=LOAD Feb 9 19:43:58.093000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001af320 items=0 ppid=2629 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:58.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306163623434333338373761306632643034313131666234343163 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit: BPF prog-id=107 op=LOAD Feb 9 19:43:58.093000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001af368 items=0 ppid=2629 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:58.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306163623434333338373761306632643034313131666234343163 Feb 9 19:43:58.093000 audit: BPF prog-id=107 op=UNLOAD Feb 9 19:43:58.093000 audit: BPF prog-id=106 op=UNLOAD Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:43:58.093000 audit: BPF prog-id=108 op=LOAD Feb 9 19:43:58.093000 audit[2695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001af778 items=0 ppid=2629 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:58.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461306163623434333338373761306632643034313131666234343163 Feb 9 19:43:58.109297 env[1115]: time="2024-02-09T19:43:58.109242592Z" level=info msg="StartContainer for \"4a0acb4433877a0f2d04111fb441cda3fa078f0fb084894e119126c886eb6f18\" returns successfully" Feb 9 19:43:58.239323 kubelet[1424]: E0209 19:43:58.239255 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:58.475253 kubelet[1424]: I0209 19:43:58.475204 1424 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-t9bv7" podStartSLOduration=-9.223372015379608e+09 pod.CreationTimestamp="2024-02-09 19:43:37 +0000 UTC" firstStartedPulling="2024-02-09 19:43:53.612743857 +0000 UTC m=+52.986822104" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:43:58.474901727 +0000 UTC m=+57.848979984" watchObservedRunningTime="2024-02-09 19:43:58.475166706 +0000 UTC m=+57.849244953" Feb 9 19:43:59.054824 systemd[1]: run-containerd-runc-k8s.io-4a0acb4433877a0f2d04111fb441cda3fa078f0fb084894e119126c886eb6f18-runc.wv8Olm.mount: Deactivated successfully. Feb 9 19:43:59.240211 kubelet[1424]: E0209 19:43:59.240157 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:43:59.930612 kubelet[1424]: I0209 19:43:59.930574 1424 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:43:59.936025 systemd[1]: Created slice kubepods-besteffort-pod75a5167e_0455_446a_949a_dafc501212f3.slice. Feb 9 19:43:59.940373 kubelet[1424]: I0209 19:43:59.940351 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/75a5167e-0455-446a-949a-dafc501212f3-calico-apiserver-certs\") pod \"calico-apiserver-8ccf84775-5br7z\" (UID: \"75a5167e-0455-446a-949a-dafc501212f3\") " pod="calico-apiserver/calico-apiserver-8ccf84775-5br7z" Feb 9 19:43:59.940473 kubelet[1424]: I0209 19:43:59.940428 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fpgmw\" (UniqueName: \"kubernetes.io/projected/75a5167e-0455-446a-949a-dafc501212f3-kube-api-access-fpgmw\") pod \"calico-apiserver-8ccf84775-5br7z\" (UID: \"75a5167e-0455-446a-949a-dafc501212f3\") " pod="calico-apiserver/calico-apiserver-8ccf84775-5br7z" Feb 9 19:43:59.945000 audit[2771]: NETFILTER_CFG table=filter:85 family=2 entries=7 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:59.952332 kernel: kauditd_printk_skb: 150 callbacks suppressed Feb 9 19:43:59.952436 kernel: audit: type=1325 audit(1707507839.945:776): table=filter:85 family=2 entries=7 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:59.952478 kernel: audit: type=1300 audit(1707507839.945:776): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff29eebb70 a2=0 a3=7fff29eebb5c items=0 ppid=1703 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:59.945000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff29eebb70 a2=0 a3=7fff29eebb5c items=0 ppid=1703 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:59.952635 kernel: audit: type=1327 audit(1707507839.945:776): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:59.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:59.948000 audit[2771]: NETFILTER_CFG table=nat:86 family=2 entries=78 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:59.948000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff29eebb70 a2=0 a3=7fff29eebb5c items=0 ppid=1703 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:59.962427 kernel: audit: type=1325 audit(1707507839.948:777): table=nat:86 family=2 entries=78 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:59.962479 kernel: audit: type=1300 audit(1707507839.948:777): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff29eebb70 a2=0 a3=7fff29eebb5c items=0 ppid=1703 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:59.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:59.963982 kernel: audit: type=1327 audit(1707507839.948:777): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:59.986000 audit[2800]: NETFILTER_CFG table=filter:87 family=2 entries=8 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:59.986000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff11e7d610 a2=0 a3=7fff11e7d5fc items=0 ppid=1703 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:59.993234 kernel: audit: type=1325 audit(1707507839.986:778): table=filter:87 family=2 entries=8 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:59.993283 kernel: audit: type=1300 audit(1707507839.986:778): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff11e7d610 a2=0 a3=7fff11e7d5fc items=0 ppid=1703 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:59.993324 kernel: audit: type=1327 audit(1707507839.986:778): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:59.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:43:59.986000 audit[2800]: NETFILTER_CFG table=nat:88 family=2 entries=78 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:00.001128 kernel: audit: type=1325 audit(1707507839.986:779): table=nat:88 family=2 entries=78 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:43:59.986000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff11e7d610 a2=0 a3=7fff11e7d5fc items=0 ppid=1703 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:43:59.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:00.041675 kubelet[1424]: E0209 19:44:00.041626 1424 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:44:00.041894 kubelet[1424]: E0209 19:44:00.041734 1424 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/75a5167e-0455-446a-949a-dafc501212f3-calico-apiserver-certs podName:75a5167e-0455-446a-949a-dafc501212f3 nodeName:}" failed. No retries permitted until 2024-02-09 19:44:00.541708299 +0000 UTC m=+59.915786547 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/75a5167e-0455-446a-949a-dafc501212f3-calico-apiserver-certs") pod "calico-apiserver-8ccf84775-5br7z" (UID: "75a5167e-0455-446a-949a-dafc501212f3") : secret "calico-apiserver-certs" not found Feb 9 19:44:00.241280 kubelet[1424]: E0209 19:44:00.241161 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:00.840100 env[1115]: time="2024-02-09T19:44:00.840041963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8ccf84775-5br7z,Uid:75a5167e-0455-446a-949a-dafc501212f3,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:44:00.949586 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:44:00.949705 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ea03400464: link becomes ready Feb 9 19:44:00.947582 systemd-networkd[1016]: cali8ea03400464: Link UP Feb 9 19:44:00.948920 systemd-networkd[1016]: cali8ea03400464: Gained carrier Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.878 [INFO][2804] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0 calico-apiserver-8ccf84775- calico-apiserver 75a5167e-0455-446a-949a-dafc501212f3 1057 0 2024-02-09 19:43:59 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8ccf84775 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.48 calico-apiserver-8ccf84775-5br7z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8ea03400464 [] []}} ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Namespace="calico-apiserver" Pod="calico-apiserver-8ccf84775-5br7z" WorkloadEndpoint="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.878 [INFO][2804] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Namespace="calico-apiserver" Pod="calico-apiserver-8ccf84775-5br7z" WorkloadEndpoint="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.899 [INFO][2818] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" HandleID="k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Workload="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.909 [INFO][2818] ipam_plugin.go 268: Auto assigning IP ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" HandleID="k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Workload="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029f9e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.48", "pod":"calico-apiserver-8ccf84775-5br7z", "timestamp":"2024-02-09 19:44:00.899955661 +0000 UTC"}, Hostname:"10.0.0.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.909 [INFO][2818] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.909 [INFO][2818] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.909 [INFO][2818] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.48' Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.910 [INFO][2818] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.925 [INFO][2818] ipam.go 372: Looking up existing affinities for host host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.929 [INFO][2818] ipam.go 489: Trying affinity for 192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.930 [INFO][2818] ipam.go 155: Attempting to load block cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.933 [INFO][2818] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.933 [INFO][2818] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.192/26 handle="k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.935 [INFO][2818] ipam.go 1682: Creating new handle: k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.939 [INFO][2818] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.192/26 handle="k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.944 [INFO][2818] ipam.go 1216: Successfully claimed IPs: [192.168.70.195/26] block=192.168.70.192/26 handle="k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.944 [INFO][2818] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.195/26] handle="k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" host="10.0.0.48" Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.944 [INFO][2818] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:44:00.956667 env[1115]: 2024-02-09 19:44:00.944 [INFO][2818] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.195/26] IPv6=[] ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" HandleID="k8s-pod-network.b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Workload="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" Feb 9 19:44:00.957223 env[1115]: 2024-02-09 19:44:00.945 [INFO][2804] k8s.go 385: Populated endpoint ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Namespace="calico-apiserver" Pod="calico-apiserver-8ccf84775-5br7z" WorkloadEndpoint="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0", GenerateName:"calico-apiserver-8ccf84775-", Namespace:"calico-apiserver", SelfLink:"", UID:"75a5167e-0455-446a-949a-dafc501212f3", ResourceVersion:"1057", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8ccf84775", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"", Pod:"calico-apiserver-8ccf84775-5br7z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8ea03400464", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:00.957223 env[1115]: 2024-02-09 19:44:00.946 [INFO][2804] k8s.go 386: Calico CNI using IPs: [192.168.70.195/32] ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Namespace="calico-apiserver" Pod="calico-apiserver-8ccf84775-5br7z" WorkloadEndpoint="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" Feb 9 19:44:00.957223 env[1115]: 2024-02-09 19:44:00.946 [INFO][2804] dataplane_linux.go 68: Setting the host side veth name to cali8ea03400464 ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Namespace="calico-apiserver" Pod="calico-apiserver-8ccf84775-5br7z" WorkloadEndpoint="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" Feb 9 19:44:00.957223 env[1115]: 2024-02-09 19:44:00.947 [INFO][2804] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Namespace="calico-apiserver" Pod="calico-apiserver-8ccf84775-5br7z" WorkloadEndpoint="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" Feb 9 19:44:00.957223 env[1115]: 2024-02-09 19:44:00.949 [INFO][2804] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Namespace="calico-apiserver" Pod="calico-apiserver-8ccf84775-5br7z" WorkloadEndpoint="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0", GenerateName:"calico-apiserver-8ccf84775-", Namespace:"calico-apiserver", SelfLink:"", UID:"75a5167e-0455-446a-949a-dafc501212f3", ResourceVersion:"1057", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8ccf84775", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd", Pod:"calico-apiserver-8ccf84775-5br7z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.70.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8ea03400464", MAC:"0a:92:3d:61:db:eb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:00.957223 env[1115]: 2024-02-09 19:44:00.955 [INFO][2804] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd" Namespace="calico-apiserver" Pod="calico-apiserver-8ccf84775-5br7z" WorkloadEndpoint="10.0.0.48-k8s-calico--apiserver--8ccf84775--5br7z-eth0" Feb 9 19:44:00.971000 audit[2852]: NETFILTER_CFG table=filter:89 family=2 entries=51 op=nft_register_chain pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:44:00.971000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=26916 a0=3 a1=7fff36ca3410 a2=0 a3=7fff36ca33fc items=0 ppid=2138 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:00.971000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:44:00.973404 env[1115]: time="2024-02-09T19:44:00.972080211Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:44:00.973404 env[1115]: time="2024-02-09T19:44:00.972140975Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:44:00.973404 env[1115]: time="2024-02-09T19:44:00.972151695Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:44:00.973404 env[1115]: time="2024-02-09T19:44:00.972335381Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd pid=2851 runtime=io.containerd.runc.v2 Feb 9 19:44:00.989731 systemd[1]: Started cri-containerd-b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd.scope. Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.002000 audit: BPF prog-id=109 op=LOAD Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:01.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373265333632346439346462373666623134666639323437653862 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:01.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373265333632346439346462373666623134666639323437653862 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit: BPF prog-id=110 op=LOAD Feb 9 19:44:01.003000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000292360 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:01.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373265333632346439346462373666623134666639323437653862 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.003000 audit: BPF prog-id=111 op=LOAD Feb 9 19:44:01.003000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002923a8 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:01.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373265333632346439346462373666623134666639323437653862 Feb 9 19:44:01.003000 audit: BPF prog-id=111 op=UNLOAD Feb 9 19:44:01.004000 audit: BPF prog-id=110 op=UNLOAD Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:01.004000 audit: BPF prog-id=112 op=LOAD Feb 9 19:44:01.004000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002927b8 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:01.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232373265333632346439346462373666623134666639323437653862 Feb 9 19:44:01.011607 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:44:01.028821 env[1115]: time="2024-02-09T19:44:01.028760470Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8ccf84775-5br7z,Uid:75a5167e-0455-446a-949a-dafc501212f3,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd\"" Feb 9 19:44:01.030961 env[1115]: time="2024-02-09T19:44:01.030813620Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:44:01.201417 kubelet[1424]: E0209 19:44:01.201287 1424 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:01.205992 env[1115]: time="2024-02-09T19:44:01.205947454Z" level=info msg="StopPodSandbox for \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\"" Feb 9 19:44:01.242288 kubelet[1424]: E0209 19:44:01.242242 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.272 [WARNING][2899] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"64086fee-2d45-447f-b625-9ab3fc23dc7f", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17", Pod:"nginx-deployment-8ffc5cf85-t9bv7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie809fa8567b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.272 [INFO][2899] k8s.go 578: Cleaning up netns ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.272 [INFO][2899] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" iface="eth0" netns="" Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.272 [INFO][2899] k8s.go 585: Releasing IP address(es) ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.272 [INFO][2899] utils.go 188: Calico CNI releasing IP address ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.287 [INFO][2907] ipam_plugin.go 415: Releasing address using handleID ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.287 [INFO][2907] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.287 [INFO][2907] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.293 [WARNING][2907] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.293 [INFO][2907] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.295 [INFO][2907] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:44:01.297261 env[1115]: 2024-02-09 19:44:01.296 [INFO][2899] k8s.go 591: Teardown processing complete. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:44:01.297729 env[1115]: time="2024-02-09T19:44:01.297300068Z" level=info msg="TearDown network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\" successfully" Feb 9 19:44:01.297729 env[1115]: time="2024-02-09T19:44:01.297341326Z" level=info msg="StopPodSandbox for \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\" returns successfully" Feb 9 19:44:01.298063 env[1115]: time="2024-02-09T19:44:01.298021173Z" level=info msg="RemovePodSandbox for \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\"" Feb 9 19:44:01.298175 env[1115]: time="2024-02-09T19:44:01.298068693Z" level=info msg="Forcibly stopping sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\"" Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.328 [WARNING][2932] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"64086fee-2d45-447f-b625-9ab3fc23dc7f", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"fdb8a695218abc86e769a27ec1f170dcec8848b4cbd34d559f9be04c55697e17", Pod:"nginx-deployment-8ffc5cf85-t9bv7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie809fa8567b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.328 [INFO][2932] k8s.go 578: Cleaning up netns ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.328 [INFO][2932] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" iface="eth0" netns="" Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.328 [INFO][2932] k8s.go 585: Releasing IP address(es) ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.328 [INFO][2932] utils.go 188: Calico CNI releasing IP address ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.348 [INFO][2940] ipam_plugin.go 415: Releasing address using handleID ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.348 [INFO][2940] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.348 [INFO][2940] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.356 [WARNING][2940] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.356 [INFO][2940] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" HandleID="k8s-pod-network.e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Workload="10.0.0.48-k8s-nginx--deployment--8ffc5cf85--t9bv7-eth0" Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.357 [INFO][2940] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:44:01.359447 env[1115]: 2024-02-09 19:44:01.358 [INFO][2932] k8s.go 591: Teardown processing complete. ContainerID="e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d" Feb 9 19:44:01.360009 env[1115]: time="2024-02-09T19:44:01.359504533Z" level=info msg="TearDown network for sandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\" successfully" Feb 9 19:44:01.389836 env[1115]: time="2024-02-09T19:44:01.389786353Z" level=info msg="RemovePodSandbox \"e371599aba5d895f0b3f19bfc00018beb5ee4e01f29868b5c64c99073976744d\" returns successfully" Feb 9 19:44:01.391475 env[1115]: time="2024-02-09T19:44:01.391436355Z" level=info msg="StopPodSandbox for \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\"" Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.429 [WARNING][2965] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-csi--node--driver--szh6v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"af77093f-b116-4d38-b63b-04d9b5587b5c", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a", Pod:"csi-node-driver-szh6v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali30a9478858b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.429 [INFO][2965] k8s.go 578: Cleaning up netns ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.429 [INFO][2965] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" iface="eth0" netns="" Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.429 [INFO][2965] k8s.go 585: Releasing IP address(es) ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.429 [INFO][2965] utils.go 188: Calico CNI releasing IP address ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.448 [INFO][2973] ipam_plugin.go 415: Releasing address using handleID ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.448 [INFO][2973] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.448 [INFO][2973] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.455 [WARNING][2973] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.455 [INFO][2973] ipam_plugin.go 443: Releasing address using workloadID ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.457 [INFO][2973] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:44:01.459416 env[1115]: 2024-02-09 19:44:01.458 [INFO][2965] k8s.go 591: Teardown processing complete. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:44:01.459416 env[1115]: time="2024-02-09T19:44:01.459374260Z" level=info msg="TearDown network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\" successfully" Feb 9 19:44:01.459904 env[1115]: time="2024-02-09T19:44:01.459427790Z" level=info msg="StopPodSandbox for \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\" returns successfully" Feb 9 19:44:01.460624 env[1115]: time="2024-02-09T19:44:01.460585417Z" level=info msg="RemovePodSandbox for \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\"" Feb 9 19:44:01.460687 env[1115]: time="2024-02-09T19:44:01.460631112Z" level=info msg="Forcibly stopping sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\"" Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.493 [WARNING][2996] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-csi--node--driver--szh6v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"af77093f-b116-4d38-b63b-04d9b5587b5c", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 43, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"5f9b0106d3512588c48dfcdc5e0c2b48cbe72d241639b51a24197919dacbab9a", Pod:"csi-node-driver-szh6v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali30a9478858b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.493 [INFO][2996] k8s.go 578: Cleaning up netns ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.493 [INFO][2996] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" iface="eth0" netns="" Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.493 [INFO][2996] k8s.go 585: Releasing IP address(es) ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.493 [INFO][2996] utils.go 188: Calico CNI releasing IP address ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.508 [INFO][3004] ipam_plugin.go 415: Releasing address using handleID ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.508 [INFO][3004] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.508 [INFO][3004] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.515 [WARNING][3004] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.515 [INFO][3004] ipam_plugin.go 443: Releasing address using workloadID ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" HandleID="k8s-pod-network.04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Workload="10.0.0.48-k8s-csi--node--driver--szh6v-eth0" Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.516 [INFO][3004] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:44:01.518314 env[1115]: 2024-02-09 19:44:01.517 [INFO][2996] k8s.go 591: Teardown processing complete. ContainerID="04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59" Feb 9 19:44:01.518838 env[1115]: time="2024-02-09T19:44:01.518354643Z" level=info msg="TearDown network for sandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\" successfully" Feb 9 19:44:01.520797 env[1115]: time="2024-02-09T19:44:01.520763833Z" level=info msg="RemovePodSandbox \"04879d23f4a355a81b9e1146105e9c39b2f75eee9f136ce491990a1215873f59\" returns successfully" Feb 9 19:44:02.243234 kubelet[1424]: E0209 19:44:02.243175 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:02.673296 systemd-networkd[1016]: cali8ea03400464: Gained IPv6LL Feb 9 19:44:03.243822 kubelet[1424]: E0209 19:44:03.243749 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:04.244775 kubelet[1424]: E0209 19:44:04.244714 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:04.813860 env[1115]: time="2024-02-09T19:44:04.813787921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:04.815856 env[1115]: time="2024-02-09T19:44:04.815803690Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:04.818023 env[1115]: time="2024-02-09T19:44:04.817954340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:04.819891 env[1115]: time="2024-02-09T19:44:04.819855022Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:04.820647 env[1115]: time="2024-02-09T19:44:04.820607476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:44:04.822476 env[1115]: time="2024-02-09T19:44:04.822435120Z" level=info msg="CreateContainer within sandbox \"b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:44:04.834160 env[1115]: time="2024-02-09T19:44:04.834097495Z" level=info msg="CreateContainer within sandbox \"b272e3624d94db76fb14ff9247e8b29f86db5d3a7d2ed401812a8159a323cebd\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1a921f1f038b6d2ced614ce188cd65e859b0067906da809bcd415eb0b7e5080b\"" Feb 9 19:44:04.834766 env[1115]: time="2024-02-09T19:44:04.834715517Z" level=info msg="StartContainer for \"1a921f1f038b6d2ced614ce188cd65e859b0067906da809bcd415eb0b7e5080b\"" Feb 9 19:44:04.854874 systemd[1]: Started cri-containerd-1a921f1f038b6d2ced614ce188cd65e859b0067906da809bcd415eb0b7e5080b.scope. Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.866000 audit: BPF prog-id=113 op=LOAD Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:04.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393231663166303338623664326365643631346365313838636436 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:04.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393231663166303338623664326365643631346365313838636436 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit: BPF prog-id=114 op=LOAD Feb 9 19:44:04.867000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c8c00 items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:04.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393231663166303338623664326365643631346365313838636436 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit: BPF prog-id=115 op=LOAD Feb 9 19:44:04.867000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c8c48 items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:04.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393231663166303338623664326365643631346365313838636436 Feb 9 19:44:04.867000 audit: BPF prog-id=115 op=UNLOAD Feb 9 19:44:04.867000 audit: BPF prog-id=114 op=UNLOAD Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:04.867000 audit: BPF prog-id=116 op=LOAD Feb 9 19:44:04.867000 audit[3026]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c9058 items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:04.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393231663166303338623664326365643631346365313838636436 Feb 9 19:44:04.891000 audit[3074]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:04.891000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffe3f9bd20 a2=0 a3=7fffe3f9bd0c items=0 ppid=1703 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:04.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:04.893000 audit[3074]: NETFILTER_CFG table=nat:91 family=2 entries=78 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:04.893000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffe3f9bd20 a2=0 a3=7fffe3f9bd0c items=0 ppid=1703 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:04.893000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:04.944646 env[1115]: time="2024-02-09T19:44:04.944574346Z" level=info msg="StartContainer for \"1a921f1f038b6d2ced614ce188cd65e859b0067906da809bcd415eb0b7e5080b\" returns successfully" Feb 9 19:44:05.245915 kubelet[1424]: E0209 19:44:05.245760 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:05.494830 kubelet[1424]: I0209 19:44:05.494789 1424 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8ccf84775-5br7z" podStartSLOduration=-9.22337203036003e+09 pod.CreationTimestamp="2024-02-09 19:43:59 +0000 UTC" firstStartedPulling="2024-02-09 19:44:01.030477438 +0000 UTC m=+60.404555685" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:44:05.494063931 +0000 UTC m=+64.868142178" watchObservedRunningTime="2024-02-09 19:44:05.494747044 +0000 UTC m=+64.868825291" Feb 9 19:44:05.500000 audit[3040]: AVC avc: denied { watch } for pid=3040 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_44_00.1750316238/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c235,c786 tclass=file permissive=0 Feb 9 19:44:05.511683 kernel: kauditd_printk_skb: 125 callbacks suppressed Feb 9 19:44:05.511861 kernel: audit: type=1400 audit(1707507845.500:819): avc: denied { watch } for pid=3040 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_44_00.1750316238/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c235,c786 tclass=file permissive=0 Feb 9 19:44:05.511898 kernel: audit: type=1300 audit(1707507845.500:819): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003b7600 a2=fc6 a3=0 items=0 ppid=2851 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c786 key=(null) Feb 9 19:44:05.511919 kernel: audit: type=1327 audit(1707507845.500:819): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:44:05.500000 audit[3040]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003b7600 a2=fc6 a3=0 items=0 ppid=2851 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c786 key=(null) Feb 9 19:44:05.500000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:44:05.534000 audit[3109]: NETFILTER_CFG table=filter:92 family=2 entries=8 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:05.534000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe6c4872b0 a2=0 a3=7ffe6c48729c items=0 ppid=1703 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:05.540765 kernel: audit: type=1325 audit(1707507845.534:820): table=filter:92 family=2 entries=8 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:05.540829 kernel: audit: type=1300 audit(1707507845.534:820): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe6c4872b0 a2=0 a3=7ffe6c48729c items=0 ppid=1703 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:05.540852 kernel: audit: type=1327 audit(1707507845.534:820): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:05.534000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:05.536000 audit[3109]: NETFILTER_CFG table=nat:93 family=2 entries=78 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:05.536000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe6c4872b0 a2=0 a3=7ffe6c48729c items=0 ppid=1703 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:05.551546 kernel: audit: type=1325 audit(1707507845.536:821): table=nat:93 family=2 entries=78 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:05.551600 kernel: audit: type=1300 audit(1707507845.536:821): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe6c4872b0 a2=0 a3=7ffe6c48729c items=0 ppid=1703 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:05.551622 kernel: audit: type=1327 audit(1707507845.536:821): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:05.536000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:05.662073 kubelet[1424]: I0209 19:44:05.662029 1424 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:44:05.666586 systemd[1]: Created slice kubepods-besteffort-pode84bc8d7_7e53_421c_919f_0e5a948ed533.slice. Feb 9 19:44:05.671898 kubelet[1424]: I0209 19:44:05.671868 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zbzfl\" (UniqueName: \"kubernetes.io/projected/e84bc8d7-7e53-421c-919f-0e5a948ed533-kube-api-access-zbzfl\") pod \"nfs-server-provisioner-0\" (UID: \"e84bc8d7-7e53-421c-919f-0e5a948ed533\") " pod="default/nfs-server-provisioner-0" Feb 9 19:44:05.671898 kubelet[1424]: I0209 19:44:05.671911 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/e84bc8d7-7e53-421c-919f-0e5a948ed533-data\") pod \"nfs-server-provisioner-0\" (UID: \"e84bc8d7-7e53-421c-919f-0e5a948ed533\") " pod="default/nfs-server-provisioner-0" Feb 9 19:44:05.969568 env[1115]: time="2024-02-09T19:44:05.969493232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e84bc8d7-7e53-421c-919f-0e5a948ed533,Namespace:default,Attempt:0,}" Feb 9 19:44:06.069891 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:44:06.070021 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 19:44:06.070253 systemd-networkd[1016]: cali60e51b789ff: Link UP Feb 9 19:44:06.070392 systemd-networkd[1016]: cali60e51b789ff: Gained carrier Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.011 [INFO][3114] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.48-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default e84bc8d7-7e53-421c-919f-0e5a948ed533 1120 0 2024-02-09 19:44:05 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.48 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.48-k8s-nfs--server--provisioner--0-" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.011 [INFO][3114] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.033 [INFO][3126] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" HandleID="k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Workload="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.044 [INFO][3126] ipam_plugin.go 268: Auto assigning IP ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" HandleID="k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Workload="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000cdfe0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.48", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 19:44:06.033018269 +0000 UTC"}, Hostname:"10.0.0.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.044 [INFO][3126] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.044 [INFO][3126] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.044 [INFO][3126] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.48' Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.045 [INFO][3126] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.049 [INFO][3126] ipam.go 372: Looking up existing affinities for host host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.052 [INFO][3126] ipam.go 489: Trying affinity for 192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.054 [INFO][3126] ipam.go 155: Attempting to load block cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.056 [INFO][3126] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.056 [INFO][3126] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.192/26 handle="k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.057 [INFO][3126] ipam.go 1682: Creating new handle: k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83 Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.060 [INFO][3126] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.192/26 handle="k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.065 [INFO][3126] ipam.go 1216: Successfully claimed IPs: [192.168.70.196/26] block=192.168.70.192/26 handle="k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.065 [INFO][3126] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.196/26] handle="k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" host="10.0.0.48" Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.065 [INFO][3126] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:44:06.079957 env[1115]: 2024-02-09 19:44:06.065 [INFO][3126] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.196/26] IPv6=[] ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" HandleID="k8s-pod-network.26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Workload="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:44:06.080935 env[1115]: 2024-02-09 19:44:06.066 [INFO][3114] k8s.go 385: Populated endpoint ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e84bc8d7-7e53-421c-919f-0e5a948ed533", ResourceVersion:"1120", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 44, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.70.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:06.080935 env[1115]: 2024-02-09 19:44:06.066 [INFO][3114] k8s.go 386: Calico CNI using IPs: [192.168.70.196/32] ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:44:06.080935 env[1115]: 2024-02-09 19:44:06.066 [INFO][3114] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:44:06.080935 env[1115]: 2024-02-09 19:44:06.070 [INFO][3114] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:44:06.081161 env[1115]: 2024-02-09 19:44:06.071 [INFO][3114] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"e84bc8d7-7e53-421c-919f-0e5a948ed533", ResourceVersion:"1120", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 44, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.70.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"4a:41:03:68:dd:49", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:06.081161 env[1115]: 2024-02-09 19:44:06.078 [INFO][3114] k8s.go 491: Wrote updated endpoint to datastore ContainerID="26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.48-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:44:06.090000 audit[3151]: NETFILTER_CFG table=filter:94 family=2 entries=42 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:44:06.090000 audit[3151]: SYSCALL arch=c000003e syscall=46 success=yes exit=20688 a0=3 a1=7ffdfe06b490 a2=0 a3=7ffdfe06b47c items=0 ppid=2138 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:06.090000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:44:06.094139 kernel: audit: type=1325 audit(1707507846.090:822): table=filter:94 family=2 entries=42 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:44:06.095071 env[1115]: time="2024-02-09T19:44:06.094998417Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:44:06.095071 env[1115]: time="2024-02-09T19:44:06.095046898Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:44:06.095071 env[1115]: time="2024-02-09T19:44:06.095058269Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:44:06.095324 env[1115]: time="2024-02-09T19:44:06.095245852Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83 pid=3159 runtime=io.containerd.runc.v2 Feb 9 19:44:06.110479 systemd[1]: Started cri-containerd-26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83.scope. Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit: BPF prog-id=117 op=LOAD Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3159 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:06.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646538653338643463623839333132343163323832613739633066 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3159 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:06.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646538653338643463623839333132343163323832613739633066 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.119000 audit: BPF prog-id=118 op=LOAD Feb 9 19:44:06.119000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028a5a0 items=0 ppid=3159 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:06.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646538653338643463623839333132343163323832613739633066 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.120000 audit: BPF prog-id=119 op=LOAD Feb 9 19:44:06.120000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028a5e8 items=0 ppid=3159 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:06.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646538653338643463623839333132343163323832613739633066 Feb 9 19:44:06.121000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:44:06.121000 audit: BPF prog-id=118 op=UNLOAD Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:06.121000 audit: BPF prog-id=120 op=LOAD Feb 9 19:44:06.121000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028a9f8 items=0 ppid=3159 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:06.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236646538653338643463623839333132343163323832613739633066 Feb 9 19:44:06.123674 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:44:06.145517 env[1115]: time="2024-02-09T19:44:06.145471697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:e84bc8d7-7e53-421c-919f-0e5a948ed533,Namespace:default,Attempt:0,} returns sandbox id \"26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83\"" Feb 9 19:44:06.147285 env[1115]: time="2024-02-09T19:44:06.147236233Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 19:44:06.246923 kubelet[1424]: E0209 19:44:06.246802 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:06.577000 audit[3218]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=3218 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:06.577000 audit[3218]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffe650aad50 a2=0 a3=7ffe650aad3c items=0 ppid=1703 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:06.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:06.578000 audit[3218]: NETFILTER_CFG table=nat:96 family=2 entries=78 op=nft_register_rule pid=3218 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:06.578000 audit[3218]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe650aad50 a2=0 a3=7ffe650aad3c items=0 ppid=1703 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:06.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:07.247120 kubelet[1424]: E0209 19:44:07.247050 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:07.601323 systemd-networkd[1016]: cali60e51b789ff: Gained IPv6LL Feb 9 19:44:08.248257 kubelet[1424]: E0209 19:44:08.248189 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:09.185753 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount67904928.mount: Deactivated successfully. Feb 9 19:44:09.248744 kubelet[1424]: E0209 19:44:09.248689 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:10.249406 kubelet[1424]: E0209 19:44:10.249337 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:11.249624 kubelet[1424]: E0209 19:44:11.249571 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:11.752931 env[1115]: time="2024-02-09T19:44:11.752864618Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:11.754873 env[1115]: time="2024-02-09T19:44:11.754831702Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:11.756673 env[1115]: time="2024-02-09T19:44:11.756636020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:11.758480 env[1115]: time="2024-02-09T19:44:11.758416473Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:11.759190 env[1115]: time="2024-02-09T19:44:11.759156062Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 19:44:11.761163 env[1115]: time="2024-02-09T19:44:11.761126852Z" level=info msg="CreateContainer within sandbox \"26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 19:44:11.770955 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2949673269.mount: Deactivated successfully. Feb 9 19:44:11.775588 env[1115]: time="2024-02-09T19:44:11.775546737Z" level=info msg="CreateContainer within sandbox \"26de8e38d4cb8931241c282a79c0fa8c51364445a08d2175537df865ff8d9d83\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"1432178bb2270ef9f7dc32a96bde461a33d90de6d85144fa6ac4a591ec123188\"" Feb 9 19:44:11.776187 env[1115]: time="2024-02-09T19:44:11.776156663Z" level=info msg="StartContainer for \"1432178bb2270ef9f7dc32a96bde461a33d90de6d85144fa6ac4a591ec123188\"" Feb 9 19:44:11.795675 systemd[1]: Started cri-containerd-1432178bb2270ef9f7dc32a96bde461a33d90de6d85144fa6ac4a591ec123188.scope. Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.805552 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 9 19:44:11.805613 kernel: audit: type=1400 audit(1707507851.803:843): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.809535 kernel: audit: type=1400 audit(1707507851.803:844): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.809690 kernel: audit: type=1400 audit(1707507851.803:845): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.811807 kernel: audit: type=1400 audit(1707507851.803:846): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.816503 kernel: audit: type=1400 audit(1707507851.803:847): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.816543 kernel: audit: type=1400 audit(1707507851.803:848): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.821380 kernel: audit: type=1400 audit(1707507851.803:849): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.821425 kernel: audit: type=1400 audit(1707507851.803:850): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.826259 kernel: audit: type=1400 audit(1707507851.803:851): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.826332 kernel: audit: type=1400 audit(1707507851.806:852): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit: BPF prog-id=121 op=LOAD Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3159 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:11.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333231373862623232373065663966376463333261393662646534 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3159 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:11.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333231373862623232373065663966376463333261393662646534 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.806000 audit: BPF prog-id=122 op=LOAD Feb 9 19:44:11.806000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003b8530 items=0 ppid=3159 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:11.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333231373862623232373065663966376463333261393662646534 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.808000 audit: BPF prog-id=123 op=LOAD Feb 9 19:44:11.808000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003b8578 items=0 ppid=3159 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:11.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333231373862623232373065663966376463333261393662646534 Feb 9 19:44:11.813000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:44:11.813000 audit: BPF prog-id=122 op=UNLOAD Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { perfmon } for pid=3228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit[3228]: AVC avc: denied { bpf } for pid=3228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:11.813000 audit: BPF prog-id=124 op=LOAD Feb 9 19:44:11.813000 audit[3228]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b8988 items=0 ppid=3159 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:11.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134333231373862623232373065663966376463333261393662646534 Feb 9 19:44:11.837599 env[1115]: time="2024-02-09T19:44:11.837538515Z" level=info msg="StartContainer for \"1432178bb2270ef9f7dc32a96bde461a33d90de6d85144fa6ac4a591ec123188\" returns successfully" Feb 9 19:44:11.871000 audit[3256]: AVC avc: denied { search } for pid=3256 comm="rpcbind" name="crypto" dev="proc" ino=24982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:44:11.871000 audit[3256]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f66d331e0c0 a2=0 a3=0 items=0 ppid=3239 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 key=(null) Feb 9 19:44:11.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 19:44:11.901000 audit[3261]: AVC avc: denied { search } for pid=3261 comm="dbus-daemon" name="crypto" dev="proc" ino=24982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:44:11.901000 audit[3261]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f40a28d60c0 a2=0 a3=0 items=0 ppid=3239 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 key=(null) Feb 9 19:44:11.901000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:44:11.903000 audit[3262]: AVC avc: denied { watch } for pid=3262 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538130 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c502,c522 tclass=dir permissive=0 Feb 9 19:44:11.903000 audit[3262]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=56013cc42d30 a2=2c8 a3=7ffe29b7728c items=0 ppid=3239 pid=3262 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 key=(null) Feb 9 19:44:11.903000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:44:11.906000 audit[3263]: AVC avc: denied { read } for pid=3263 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23498 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 19:44:11.906000 audit[3263]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f6f063b0320 a1=80000 a2=d a3=7ffc2f4222c0 items=0 ppid=3239 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 key=(null) Feb 9 19:44:11.906000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:44:11.907000 audit[3263]: AVC avc: denied { search } for pid=3263 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24982 scontext=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:44:11.907000 audit[3263]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6f059040c0 a2=0 a3=0 items=0 ppid=3239 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c502,c522 key=(null) Feb 9 19:44:11.907000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:44:12.249837 kubelet[1424]: E0209 19:44:12.249801 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:12.507657 kubelet[1424]: I0209 19:44:12.507542 1424 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372029347265e+09 pod.CreationTimestamp="2024-02-09 19:44:05 +0000 UTC" firstStartedPulling="2024-02-09 19:44:06.146779705 +0000 UTC m=+65.520857952" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:44:12.506856563 +0000 UTC m=+71.880934820" watchObservedRunningTime="2024-02-09 19:44:12.507509749 +0000 UTC m=+71.881587996" Feb 9 19:44:12.544000 audit[3306]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=3306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:12.544000 audit[3306]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffef85bc5e0 a2=0 a3=7ffef85bc5cc items=0 ppid=1703 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:12.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:12.547000 audit[3306]: NETFILTER_CFG table=nat:98 family=2 entries=162 op=nft_register_chain pid=3306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:44:12.547000 audit[3306]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffef85bc5e0 a2=0 a3=7ffef85bc5cc items=0 ppid=1703 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:12.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:44:13.250767 kubelet[1424]: E0209 19:44:13.250711 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:14.251928 kubelet[1424]: E0209 19:44:14.251872 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:15.252674 kubelet[1424]: E0209 19:44:15.252608 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:16.253694 kubelet[1424]: E0209 19:44:16.253640 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:17.254416 kubelet[1424]: E0209 19:44:17.254356 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:18.254495 kubelet[1424]: E0209 19:44:18.254451 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:19.254587 kubelet[1424]: E0209 19:44:19.254534 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:20.254900 kubelet[1424]: E0209 19:44:20.254848 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:21.201060 kubelet[1424]: E0209 19:44:21.201003 1424 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:21.255501 kubelet[1424]: E0209 19:44:21.255455 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:21.972124 kubelet[1424]: I0209 19:44:21.972057 1424 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:44:21.980049 systemd[1]: Created slice kubepods-besteffort-pod743feabb_85d3_402e_9b26_7d515dd74cfb.slice. Feb 9 19:44:22.156223 kubelet[1424]: I0209 19:44:22.156169 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-08e5fe57-1d9b-4534-809b-6608cbd5a586\" (UniqueName: \"kubernetes.io/nfs/743feabb-85d3-402e-9b26-7d515dd74cfb-pvc-08e5fe57-1d9b-4534-809b-6608cbd5a586\") pod \"test-pod-1\" (UID: \"743feabb-85d3-402e-9b26-7d515dd74cfb\") " pod="default/test-pod-1" Feb 9 19:44:22.156223 kubelet[1424]: I0209 19:44:22.156223 1424 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pbz7x\" (UniqueName: \"kubernetes.io/projected/743feabb-85d3-402e-9b26-7d515dd74cfb-kube-api-access-pbz7x\") pod \"test-pod-1\" (UID: \"743feabb-85d3-402e-9b26-7d515dd74cfb\") " pod="default/test-pod-1" Feb 9 19:44:22.255918 kubelet[1424]: E0209 19:44:22.255830 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:22.265000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.268223 kernel: Failed to create system directory netfs Feb 9 19:44:22.268407 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 19:44:22.268431 kernel: audit: type=1400 audit(1707507862.265:868): avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.268454 kernel: Failed to create system directory netfs Feb 9 19:44:22.268475 kernel: Failed to create system directory netfs Feb 9 19:44:22.268494 kernel: Failed to create system directory netfs Feb 9 19:44:22.265000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.270957 kernel: audit: type=1400 audit(1707507862.265:868): avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.265000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.276759 kernel: audit: type=1400 audit(1707507862.265:868): avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.276804 kernel: audit: type=1400 audit(1707507862.265:868): avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.265000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.265000 audit[3317]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557d885295e0 a1=153bc a2=557d870a12b0 a3=5 items=0 ppid=1887 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.265000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:44:22.283834 kernel: audit: type=1300 audit(1707507862.265:868): arch=c000003e syscall=175 success=yes exit=0 a0=557d885295e0 a1=153bc a2=557d870a12b0 a3=5 items=0 ppid=1887 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.283886 kernel: audit: type=1327 audit(1707507862.265:868): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.288338 kernel: Failed to create system directory fscache Feb 9 19:44:22.288375 kernel: audit: type=1400 audit(1707507862.282:869): avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.288397 kernel: Failed to create system directory fscache Feb 9 19:44:22.288414 kernel: audit: type=1400 audit(1707507862.282:869): avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.291522 kernel: Failed to create system directory fscache Feb 9 19:44:22.291560 kernel: audit: type=1400 audit(1707507862.282:869): avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.291582 kernel: Failed to create system directory fscache Feb 9 19:44:22.293730 kernel: audit: type=1400 audit(1707507862.282:869): avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.294234 kernel: Failed to create system directory fscache Feb 9 19:44:22.294260 kernel: Failed to create system directory fscache Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.298421 kernel: Failed to create system directory fscache Feb 9 19:44:22.298448 kernel: Failed to create system directory fscache Feb 9 19:44:22.298466 kernel: Failed to create system directory fscache Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.299485 kernel: Failed to create system directory fscache Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.300209 kernel: Failed to create system directory fscache Feb 9 19:44:22.300259 kernel: Failed to create system directory fscache Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.301310 kernel: Failed to create system directory fscache Feb 9 19:44:22.301343 kernel: Failed to create system directory fscache Feb 9 19:44:22.282000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.282000 audit[3317]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557d8873e9c0 a1=4c0fc a2=557d870a12b0 a3=5 items=0 ppid=1887 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.282000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:44:22.304140 kernel: FS-Cache: Loaded Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.332632 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.332704 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.332722 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.332737 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.334315 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.334383 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.334402 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.335429 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.335461 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.336548 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.336579 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.337665 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.337701 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.339332 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.339377 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.339394 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.340457 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.340488 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.341570 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.341595 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.343243 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.343270 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.343285 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.344364 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.344392 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.345489 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.345515 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.346608 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.346639 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.348288 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.348316 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.348333 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.349407 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.349440 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.350513 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.350552 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.351633 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.351657 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.353307 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.353334 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.353349 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.354427 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.354556 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.355545 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.355574 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.356661 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.356680 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.358334 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.358354 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.358374 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.359466 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.359507 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.360578 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.360609 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.362258 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.362287 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.362305 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.363379 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.363409 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.364500 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.364532 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.365617 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.365637 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.367298 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.367324 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.367339 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.368412 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.368452 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.369547 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.369588 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.370654 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.370677 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.372336 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.372369 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.372383 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.373453 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.373490 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.374567 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.374596 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.376244 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.376267 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.376288 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.377365 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.377394 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.378484 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.378519 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.379599 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.379641 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.381274 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.381297 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.381312 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.382394 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.382437 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.383509 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.383562 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.384628 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.384651 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.386312 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.386346 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.386364 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.387430 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.387457 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.388553 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.388587 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.389126 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.390229 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.390262 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.391341 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.391360 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.392357 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.392421 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.393349 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.393367 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.394334 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.394352 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.395321 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.395344 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.396315 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.396346 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.397304 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.397341 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.398294 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.398320 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.399286 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.399320 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.320000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.400272 kernel: Failed to create system directory sunrpc Feb 9 19:44:22.408272 kernel: RPC: Registered named UNIX socket transport module. Feb 9 19:44:22.408317 kernel: RPC: Registered udp transport module. Feb 9 19:44:22.408334 kernel: RPC: Registered tcp transport module. Feb 9 19:44:22.408347 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 19:44:22.320000 audit[3317]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557d8878aad0 a1=1588c4 a2=557d870a12b0 a3=5 items=6 ppid=1887 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.320000 audit: CWD cwd="/" Feb 9 19:44:22.320000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:44:22.320000 audit: PATH item=1 name=(null) inode=24078 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:44:22.320000 audit: PATH item=2 name=(null) inode=24078 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:44:22.320000 audit: PATH item=3 name=(null) inode=24079 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:44:22.320000 audit: PATH item=4 name=(null) inode=24078 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:44:22.320000 audit: PATH item=5 name=(null) inode=24080 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:44:22.320000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.434571 kernel: Failed to create system directory nfs Feb 9 19:44:22.434603 kernel: Failed to create system directory nfs Feb 9 19:44:22.434618 kernel: Failed to create system directory nfs Feb 9 19:44:22.434633 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.435506 kernel: Failed to create system directory nfs Feb 9 19:44:22.435532 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.436468 kernel: Failed to create system directory nfs Feb 9 19:44:22.436492 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.437456 kernel: Failed to create system directory nfs Feb 9 19:44:22.437482 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.438408 kernel: Failed to create system directory nfs Feb 9 19:44:22.438428 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.439384 kernel: Failed to create system directory nfs Feb 9 19:44:22.439418 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.440287 kernel: Failed to create system directory nfs Feb 9 19:44:22.440312 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.441224 kernel: Failed to create system directory nfs Feb 9 19:44:22.441243 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.442153 kernel: Failed to create system directory nfs Feb 9 19:44:22.442178 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.443540 kernel: Failed to create system directory nfs Feb 9 19:44:22.443561 kernel: Failed to create system directory nfs Feb 9 19:44:22.443574 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.444468 kernel: Failed to create system directory nfs Feb 9 19:44:22.444488 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.445396 kernel: Failed to create system directory nfs Feb 9 19:44:22.445420 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.446331 kernel: Failed to create system directory nfs Feb 9 19:44:22.446364 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.447263 kernel: Failed to create system directory nfs Feb 9 19:44:22.447284 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.448195 kernel: Failed to create system directory nfs Feb 9 19:44:22.448213 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.449130 kernel: Failed to create system directory nfs Feb 9 19:44:22.449160 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.450521 kernel: Failed to create system directory nfs Feb 9 19:44:22.450555 kernel: Failed to create system directory nfs Feb 9 19:44:22.450570 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.451448 kernel: Failed to create system directory nfs Feb 9 19:44:22.451474 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.452380 kernel: Failed to create system directory nfs Feb 9 19:44:22.452410 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.453307 kernel: Failed to create system directory nfs Feb 9 19:44:22.453326 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.454249 kernel: Failed to create system directory nfs Feb 9 19:44:22.454271 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.455178 kernel: Failed to create system directory nfs Feb 9 19:44:22.455196 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.456565 kernel: Failed to create system directory nfs Feb 9 19:44:22.456590 kernel: Failed to create system directory nfs Feb 9 19:44:22.456685 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.457554 kernel: Failed to create system directory nfs Feb 9 19:44:22.457599 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.458417 kernel: Failed to create system directory nfs Feb 9 19:44:22.458447 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.459340 kernel: Failed to create system directory nfs Feb 9 19:44:22.459375 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.460263 kernel: Failed to create system directory nfs Feb 9 19:44:22.460285 kernel: Failed to create system directory nfs Feb 9 19:44:22.426000 audit[3317]: AVC avc: denied { confidentiality } for pid=3317 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.473123 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 19:44:22.426000 audit[3317]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557d8892d680 a1=e29dc a2=557d870a12b0 a3=5 items=0 ppid=1887 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.426000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.506156 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.506189 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.506211 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.506226 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.508192 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.509675 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.509743 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.510568 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.510605 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.512240 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.512288 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.513290 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.513320 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.514262 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.514286 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.515236 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.515260 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.516198 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.516228 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.517193 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.517238 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.518141 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.518186 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.519572 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.519595 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.519617 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.520575 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.520598 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.521541 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.521566 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.522501 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.522542 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.523465 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.523484 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.524424 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.524442 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.525407 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.525447 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.526362 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.526407 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.527328 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.527359 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.528290 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.528311 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.529252 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.529285 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.530203 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.530222 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.531154 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.531188 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.532568 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.532601 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.532625 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.533512 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.533544 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.534464 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.534490 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.535421 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.535442 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.536378 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.536410 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.537334 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.537370 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.538297 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.538340 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.539256 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.539289 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.540206 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.540225 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.541168 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.541186 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.542124 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.542143 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.543536 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.543554 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.543567 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.544482 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.544501 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.545438 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.545457 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.546394 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.546417 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.547349 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.547374 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.548314 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.548348 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.549263 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.549308 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.550221 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.550245 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.551176 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.551238 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.552130 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.552159 kernel: Failed to create system directory nfs4 Feb 9 19:44:22.494000 audit[3322]: AVC avc: denied { confidentiality } for pid=3322 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.691212 kernel: NFS: Registering the id_resolver key type Feb 9 19:44:22.691260 kernel: Key type id_resolver registered Feb 9 19:44:22.691278 kernel: Key type id_legacy registered Feb 9 19:44:22.494000 audit[3322]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8bf2c75010 a1=1d3cc4 a2=56200fdae2b0 a3=5 items=0 ppid=1887 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.494000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.700375 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.700415 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.700429 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.701377 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.701402 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.702386 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.702408 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.703379 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.703406 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.704376 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.704394 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.705363 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.705381 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.706351 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.706371 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.707340 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.707369 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.708330 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.708358 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.709339 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.709380 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.710325 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.710352 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.711313 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.711332 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.696000 audit[3323]: AVC avc: denied { confidentiality } for pid=3323 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:44:22.712303 kernel: Failed to create system directory rpcgss Feb 9 19:44:22.696000 audit[3323]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f0a636e6010 a1=4f524 a2=561d78e4e2b0 a3=5 items=0 ppid=1887 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.696000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 19:44:22.723820 nfsidmap[3331]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 19:44:22.726395 nfsidmap[3334]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 9 19:44:22.735000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:44:22.735000 audit[1176]: AVC avc: denied { watch_reads } for pid=1176 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:44:22.735000 audit[1176]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d3334ee0c0 a2=10 a3=7afebe650fac7873 items=0 ppid=1 pid=1176 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.735000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:44:22.735000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:44:22.735000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:44:22.735000 audit[1176]: AVC avc: denied { watch_reads } for pid=1176 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:44:22.735000 audit[1176]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d3334ee0c0 a2=10 a3=7afebe650fac7873 items=0 ppid=1 pid=1176 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.735000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:44:22.735000 audit[1176]: AVC avc: denied { watch_reads } for pid=1176 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:44:22.735000 audit[1176]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d3334ee0c0 a2=10 a3=7afebe650fac7873 items=0 ppid=1 pid=1176 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:22.735000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:44:22.882249 env[1115]: time="2024-02-09T19:44:22.882202712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:743feabb-85d3-402e-9b26-7d515dd74cfb,Namespace:default,Attempt:0,}" Feb 9 19:44:22.986338 systemd-networkd[1016]: cali5ec59c6bf6e: Link UP Feb 9 19:44:22.987747 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:44:22.987817 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 19:44:22.988045 systemd-networkd[1016]: cali5ec59c6bf6e: Gained carrier Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.925 [INFO][3337] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.48-k8s-test--pod--1-eth0 default 743feabb-85d3-402e-9b26-7d515dd74cfb 1185 0 2024-02-09 19:44:05 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.48 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.48-k8s-test--pod--1-" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.925 [INFO][3337] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.48-k8s-test--pod--1-eth0" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.953 [INFO][3352] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" HandleID="k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Workload="10.0.0.48-k8s-test--pod--1-eth0" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.963 [INFO][3352] ipam_plugin.go 268: Auto assigning IP ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" HandleID="k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Workload="10.0.0.48-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025c2e0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.48", "pod":"test-pod-1", "timestamp":"2024-02-09 19:44:22.95372586 +0000 UTC"}, Hostname:"10.0.0.48", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.963 [INFO][3352] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.963 [INFO][3352] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.963 [INFO][3352] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.48' Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.965 [INFO][3352] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.968 [INFO][3352] ipam.go 372: Looking up existing affinities for host host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.971 [INFO][3352] ipam.go 489: Trying affinity for 192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.972 [INFO][3352] ipam.go 155: Attempting to load block cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.974 [INFO][3352] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.70.192/26 host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.974 [INFO][3352] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.70.192/26 handle="k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.976 [INFO][3352] ipam.go 1682: Creating new handle: k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2 Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.978 [INFO][3352] ipam.go 1203: Writing block in order to claim IPs block=192.168.70.192/26 handle="k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.982 [INFO][3352] ipam.go 1216: Successfully claimed IPs: [192.168.70.197/26] block=192.168.70.192/26 handle="k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.983 [INFO][3352] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.70.197/26] handle="k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" host="10.0.0.48" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.983 [INFO][3352] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.983 [INFO][3352] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.70.197/26] IPv6=[] ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" HandleID="k8s-pod-network.72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Workload="10.0.0.48-k8s-test--pod--1-eth0" Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.984 [INFO][3337] k8s.go 385: Populated endpoint ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.48-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"743feabb-85d3-402e-9b26-7d515dd74cfb", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 44, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:23.110614 env[1115]: 2024-02-09 19:44:22.984 [INFO][3337] k8s.go 386: Calico CNI using IPs: [192.168.70.197/32] ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.48-k8s-test--pod--1-eth0" Feb 9 19:44:23.111587 env[1115]: 2024-02-09 19:44:22.984 [INFO][3337] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.48-k8s-test--pod--1-eth0" Feb 9 19:44:23.111587 env[1115]: 2024-02-09 19:44:22.988 [INFO][3337] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.48-k8s-test--pod--1-eth0" Feb 9 19:44:23.111587 env[1115]: 2024-02-09 19:44:22.988 [INFO][3337] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.48-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.48-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"743feabb-85d3-402e-9b26-7d515dd74cfb", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 44, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.48", ContainerID:"72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.70.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"16:ee:4a:70:94:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:44:23.111587 env[1115]: 2024-02-09 19:44:23.109 [INFO][3337] k8s.go 491: Wrote updated endpoint to datastore ContainerID="72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.48-k8s-test--pod--1-eth0" Feb 9 19:44:23.123000 audit[3374]: NETFILTER_CFG table=filter:99 family=2 entries=42 op=nft_register_chain pid=3374 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:44:23.123000 audit[3374]: SYSCALL arch=c000003e syscall=46 success=yes exit=20268 a0=3 a1=7ffda2df3370 a2=0 a3=7ffda2df335c items=0 ppid=2138 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.123000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:44:23.186991 env[1115]: time="2024-02-09T19:44:23.186800591Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:44:23.186991 env[1115]: time="2024-02-09T19:44:23.186858640Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:44:23.186991 env[1115]: time="2024-02-09T19:44:23.186875482Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:44:23.187217 env[1115]: time="2024-02-09T19:44:23.187065890Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2 pid=3382 runtime=io.containerd.runc.v2 Feb 9 19:44:23.199008 systemd[1]: Started cri-containerd-72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2.scope. Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.208000 audit: BPF prog-id=125 op=LOAD Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3382 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732383839623130396264373934303634663039653065356162353832 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3382 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732383839623130396264373934303634663039653065356162353832 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit: BPF prog-id=126 op=LOAD Feb 9 19:44:23.209000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e0a30 items=0 ppid=3382 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732383839623130396264373934303634663039653065356162353832 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit: BPF prog-id=127 op=LOAD Feb 9 19:44:23.209000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e0a78 items=0 ppid=3382 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732383839623130396264373934303634663039653065356162353832 Feb 9 19:44:23.209000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:44:23.209000 audit: BPF prog-id=126 op=UNLOAD Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.209000 audit: BPF prog-id=128 op=LOAD Feb 9 19:44:23.209000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e0e88 items=0 ppid=3382 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732383839623130396264373934303634663039653065356162353832 Feb 9 19:44:23.211268 systemd-resolved[1066]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 9 19:44:23.234711 env[1115]: time="2024-02-09T19:44:23.234643164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:743feabb-85d3-402e-9b26-7d515dd74cfb,Namespace:default,Attempt:0,} returns sandbox id \"72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2\"" Feb 9 19:44:23.236508 env[1115]: time="2024-02-09T19:44:23.236480452Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:44:23.256186 kubelet[1424]: E0209 19:44:23.256148 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:23.610153 env[1115]: time="2024-02-09T19:44:23.610100903Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:23.611811 env[1115]: time="2024-02-09T19:44:23.611761559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:23.613172 env[1115]: time="2024-02-09T19:44:23.613143361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:23.614611 env[1115]: time="2024-02-09T19:44:23.614579746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:44:23.615153 env[1115]: time="2024-02-09T19:44:23.615121162Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:44:23.616682 env[1115]: time="2024-02-09T19:44:23.616647685Z" level=info msg="CreateContainer within sandbox \"72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 19:44:23.630811 env[1115]: time="2024-02-09T19:44:23.630776253Z" level=info msg="CreateContainer within sandbox \"72889b109bd794064f09e0e5ab5828cad76d4011bfbde21af071da079067eaf2\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"a873227d892bc54ca151a2f2f8c81af4db64241e008aec205713ed9d34eb8205\"" Feb 9 19:44:23.631232 env[1115]: time="2024-02-09T19:44:23.631207012Z" level=info msg="StartContainer for \"a873227d892bc54ca151a2f2f8c81af4db64241e008aec205713ed9d34eb8205\"" Feb 9 19:44:23.658214 systemd[1]: Started cri-containerd-a873227d892bc54ca151a2f2f8c81af4db64241e008aec205713ed9d34eb8205.scope. Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit: BPF prog-id=129 op=LOAD Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3382 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373332323764383932626335346361313531613266326638633831 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3382 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373332323764383932626335346361313531613266326638633831 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit: BPF prog-id=130 op=LOAD Feb 9 19:44:23.667000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ce120 items=0 ppid=3382 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373332323764383932626335346361313531613266326638633831 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.667000 audit: BPF prog-id=131 op=LOAD Feb 9 19:44:23.667000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ce168 items=0 ppid=3382 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373332323764383932626335346361313531613266326638633831 Feb 9 19:44:23.668000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:44:23.668000 audit: BPF prog-id=130 op=UNLOAD Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { perfmon } for pid=3431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit[3431]: AVC avc: denied { bpf } for pid=3431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:44:23.668000 audit: BPF prog-id=132 op=LOAD Feb 9 19:44:23.668000 audit[3431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ce578 items=0 ppid=3382 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:44:23.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138373332323764383932626335346361313531613266326638633831 Feb 9 19:44:23.679639 env[1115]: time="2024-02-09T19:44:23.679599536Z" level=info msg="StartContainer for \"a873227d892bc54ca151a2f2f8c81af4db64241e008aec205713ed9d34eb8205\" returns successfully" Feb 9 19:44:24.256545 kubelet[1424]: E0209 19:44:24.256514 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:24.530461 kubelet[1424]: I0209 19:44:24.530362 1424 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.223372017324465e+09 pod.CreationTimestamp="2024-02-09 19:44:05 +0000 UTC" firstStartedPulling="2024-02-09 19:44:23.236036168 +0000 UTC m=+82.610114415" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:44:24.530052336 +0000 UTC m=+83.904130583" watchObservedRunningTime="2024-02-09 19:44:24.53031071 +0000 UTC m=+83.904388957" Feb 9 19:44:24.561283 systemd-networkd[1016]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 19:44:25.257497 kubelet[1424]: E0209 19:44:25.257446 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:26.258255 kubelet[1424]: E0209 19:44:26.258178 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:27.258842 kubelet[1424]: E0209 19:44:27.258786 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:44:28.258931 kubelet[1424]: E0209 19:44:28.258892 1424 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"