Feb 12 19:47:49.783082 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 19:47:49.783106 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:47:49.783117 kernel: BIOS-provided physical RAM map: Feb 12 19:47:49.783122 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:47:49.783127 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 12 19:47:49.783133 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 12 19:47:49.783139 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Feb 12 19:47:49.783145 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 12 19:47:49.783150 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 12 19:47:49.783156 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 12 19:47:49.783162 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Feb 12 19:47:49.783175 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 12 19:47:49.783181 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 12 19:47:49.783186 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 12 19:47:49.783193 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 12 19:47:49.783201 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 12 19:47:49.783206 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 12 19:47:49.783212 kernel: NX (Execute Disable) protection: active Feb 12 19:47:49.783218 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 12 19:47:49.783224 kernel: e820: update [mem 0x9b3f7018-0x9b400c57] usable ==> usable Feb 12 19:47:49.783230 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 12 19:47:49.783235 kernel: e820: update [mem 0x9b1aa018-0x9b1e6e57] usable ==> usable Feb 12 19:47:49.783241 kernel: extended physical RAM map: Feb 12 19:47:49.783247 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:47:49.783252 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Feb 12 19:47:49.783259 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Feb 12 19:47:49.783265 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Feb 12 19:47:49.783271 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Feb 12 19:47:49.783277 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Feb 12 19:47:49.783282 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Feb 12 19:47:49.783288 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b1aa017] usable Feb 12 19:47:49.783294 kernel: reserve setup_data: [mem 0x000000009b1aa018-0x000000009b1e6e57] usable Feb 12 19:47:49.783299 kernel: reserve setup_data: [mem 0x000000009b1e6e58-0x000000009b3f7017] usable Feb 12 19:47:49.783305 kernel: reserve setup_data: [mem 0x000000009b3f7018-0x000000009b400c57] usable Feb 12 19:47:49.783311 kernel: reserve setup_data: [mem 0x000000009b400c58-0x000000009c8eefff] usable Feb 12 19:47:49.783317 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Feb 12 19:47:49.783323 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Feb 12 19:47:49.783329 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Feb 12 19:47:49.783335 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Feb 12 19:47:49.783341 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Feb 12 19:47:49.783350 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Feb 12 19:47:49.783356 kernel: efi: EFI v2.70 by EDK II Feb 12 19:47:49.783362 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b773018 RNG=0x9cb75018 Feb 12 19:47:49.783369 kernel: random: crng init done Feb 12 19:47:49.783376 kernel: SMBIOS 2.8 present. Feb 12 19:47:49.783914 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015 Feb 12 19:47:49.783922 kernel: Hypervisor detected: KVM Feb 12 19:47:49.783929 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 19:47:49.783935 kernel: kvm-clock: cpu 0, msr 54faa001, primary cpu clock Feb 12 19:47:49.783941 kernel: kvm-clock: using sched offset of 3886614507 cycles Feb 12 19:47:49.783948 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 19:47:49.783959 kernel: tsc: Detected 2794.750 MHz processor Feb 12 19:47:49.783968 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:47:49.783975 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:47:49.783981 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Feb 12 19:47:49.783988 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:47:49.783994 kernel: Using GB pages for direct mapping Feb 12 19:47:49.784001 kernel: Secure boot disabled Feb 12 19:47:49.784007 kernel: ACPI: Early table checksum verification disabled Feb 12 19:47:49.784014 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Feb 12 19:47:49.784020 kernel: ACPI: XSDT 0x000000009CB7D0E8 00004C (v01 BOCHS BXPC 00000001 01000013) Feb 12 19:47:49.784028 kernel: ACPI: FACP 0x000000009CB7A000 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:47:49.784059 kernel: ACPI: DSDT 0x000000009CB7B000 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:47:49.784066 kernel: ACPI: FACS 0x000000009CBDD000 000040 Feb 12 19:47:49.784072 kernel: ACPI: APIC 0x000000009CB79000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:47:49.784079 kernel: ACPI: HPET 0x000000009CB78000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:47:49.784085 kernel: ACPI: WAET 0x000000009CB77000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:47:49.784092 kernel: ACPI: BGRT 0x000000009CB76000 000038 (v01 INTEL EDK2 00000002 01000013) Feb 12 19:47:49.784098 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb7a000-0x9cb7a073] Feb 12 19:47:49.784105 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7b000-0x9cb7ca38] Feb 12 19:47:49.784113 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Feb 12 19:47:49.784119 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb79000-0x9cb7908f] Feb 12 19:47:49.784126 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb78000-0x9cb78037] Feb 12 19:47:49.784132 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb77000-0x9cb77027] Feb 12 19:47:49.784139 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb76000-0x9cb76037] Feb 12 19:47:49.784145 kernel: No NUMA configuration found Feb 12 19:47:49.784152 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Feb 12 19:47:49.784158 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Feb 12 19:47:49.784170 kernel: Zone ranges: Feb 12 19:47:49.784178 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:47:49.784185 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Feb 12 19:47:49.784191 kernel: Normal empty Feb 12 19:47:49.784198 kernel: Movable zone start for each node Feb 12 19:47:49.784204 kernel: Early memory node ranges Feb 12 19:47:49.784210 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 12 19:47:49.784217 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Feb 12 19:47:49.784223 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Feb 12 19:47:49.784230 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Feb 12 19:47:49.784237 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Feb 12 19:47:49.784243 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Feb 12 19:47:49.784250 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Feb 12 19:47:49.784256 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:47:49.784262 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 12 19:47:49.784269 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Feb 12 19:47:49.784275 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:47:49.784281 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Feb 12 19:47:49.784288 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Feb 12 19:47:49.784295 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Feb 12 19:47:49.784302 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 19:47:49.784308 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 19:47:49.784315 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:47:49.784321 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 19:47:49.784328 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 19:47:49.784334 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:47:49.784340 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 19:47:49.784347 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 19:47:49.784354 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:47:49.784361 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 19:47:49.784367 kernel: TSC deadline timer available Feb 12 19:47:49.784373 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Feb 12 19:47:49.784380 kernel: kvm-guest: KVM setup pv remote TLB flush Feb 12 19:47:49.784386 kernel: kvm-guest: setup PV sched yield Feb 12 19:47:49.784393 kernel: [mem 0x9d000000-0xffffffff] available for PCI devices Feb 12 19:47:49.784399 kernel: Booting paravirtualized kernel on KVM Feb 12 19:47:49.784406 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:47:49.784412 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Feb 12 19:47:49.784420 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u524288 Feb 12 19:47:49.784427 kernel: pcpu-alloc: s185624 r8192 d31464 u524288 alloc=1*2097152 Feb 12 19:47:49.784438 kernel: pcpu-alloc: [0] 0 1 2 3 Feb 12 19:47:49.784445 kernel: kvm-guest: setup async PF for cpu 0 Feb 12 19:47:49.784452 kernel: kvm-guest: stealtime: cpu 0, msr 9ae1c0c0 Feb 12 19:47:49.784459 kernel: kvm-guest: PV spinlocks enabled Feb 12 19:47:49.784465 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 19:47:49.784472 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Feb 12 19:47:49.784479 kernel: Policy zone: DMA32 Feb 12 19:47:49.784487 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:47:49.784494 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:47:49.784502 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:47:49.784508 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:47:49.784515 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:47:49.784522 kernel: Memory: 2400436K/2567000K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 166304K reserved, 0K cma-reserved) Feb 12 19:47:49.784529 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Feb 12 19:47:49.784537 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:47:49.784544 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:47:49.784551 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:47:49.784558 kernel: rcu: RCU event tracing is enabled. Feb 12 19:47:49.784565 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Feb 12 19:47:49.784572 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:47:49.784579 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:47:49.784585 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:47:49.784592 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Feb 12 19:47:49.784600 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Feb 12 19:47:49.784607 kernel: Console: colour dummy device 80x25 Feb 12 19:47:49.784614 kernel: printk: console [ttyS0] enabled Feb 12 19:47:49.784620 kernel: ACPI: Core revision 20210730 Feb 12 19:47:49.784627 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 19:47:49.784634 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:47:49.784641 kernel: x2apic enabled Feb 12 19:47:49.784648 kernel: Switched APIC routing to physical x2apic. Feb 12 19:47:49.784655 kernel: kvm-guest: setup PV IPIs Feb 12 19:47:49.784662 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 19:47:49.784669 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 12 19:47:49.784676 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Feb 12 19:47:49.784683 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 12 19:47:49.784689 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 12 19:47:49.784696 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 12 19:47:49.784703 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:47:49.784709 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:47:49.784716 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:47:49.784724 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:47:49.784731 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 12 19:47:49.784737 kernel: RETBleed: Mitigation: untrained return thunk Feb 12 19:47:49.784744 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 19:47:49.784751 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 19:47:49.784758 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:47:49.784765 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:47:49.784771 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:47:49.784778 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:47:49.784786 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 19:47:49.784793 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:47:49.784800 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:47:49.784806 kernel: LSM: Security Framework initializing Feb 12 19:47:49.784813 kernel: SELinux: Initializing. Feb 12 19:47:49.784819 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:47:49.784826 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:47:49.784833 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 12 19:47:49.784841 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 12 19:47:49.784847 kernel: ... version: 0 Feb 12 19:47:49.784854 kernel: ... bit width: 48 Feb 12 19:47:49.784861 kernel: ... generic registers: 6 Feb 12 19:47:49.784867 kernel: ... value mask: 0000ffffffffffff Feb 12 19:47:49.784874 kernel: ... max period: 00007fffffffffff Feb 12 19:47:49.784881 kernel: ... fixed-purpose events: 0 Feb 12 19:47:49.784887 kernel: ... event mask: 000000000000003f Feb 12 19:47:49.784894 kernel: signal: max sigframe size: 1776 Feb 12 19:47:49.784901 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:47:49.784909 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:47:49.784915 kernel: x86: Booting SMP configuration: Feb 12 19:47:49.784922 kernel: .... node #0, CPUs: #1 Feb 12 19:47:49.784929 kernel: kvm-clock: cpu 1, msr 54faa041, secondary cpu clock Feb 12 19:47:49.784935 kernel: kvm-guest: setup async PF for cpu 1 Feb 12 19:47:49.784942 kernel: kvm-guest: stealtime: cpu 1, msr 9ae9c0c0 Feb 12 19:47:49.784949 kernel: #2 Feb 12 19:47:49.784955 kernel: kvm-clock: cpu 2, msr 54faa081, secondary cpu clock Feb 12 19:47:49.784962 kernel: kvm-guest: setup async PF for cpu 2 Feb 12 19:47:49.784969 kernel: kvm-guest: stealtime: cpu 2, msr 9af1c0c0 Feb 12 19:47:49.784976 kernel: #3 Feb 12 19:47:49.784983 kernel: kvm-clock: cpu 3, msr 54faa0c1, secondary cpu clock Feb 12 19:47:49.784989 kernel: kvm-guest: setup async PF for cpu 3 Feb 12 19:47:49.784996 kernel: kvm-guest: stealtime: cpu 3, msr 9af9c0c0 Feb 12 19:47:49.785003 kernel: smp: Brought up 1 node, 4 CPUs Feb 12 19:47:49.785009 kernel: smpboot: Max logical packages: 1 Feb 12 19:47:49.785016 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Feb 12 19:47:49.785023 kernel: devtmpfs: initialized Feb 12 19:47:49.785053 kernel: x86/mm: Memory block size: 128MB Feb 12 19:47:49.785060 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Feb 12 19:47:49.785067 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Feb 12 19:47:49.785074 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Feb 12 19:47:49.785081 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Feb 12 19:47:49.785088 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Feb 12 19:47:49.785095 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:47:49.785102 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Feb 12 19:47:49.785116 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:47:49.785125 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:47:49.785132 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:47:49.785139 kernel: audit: type=2000 audit(1707767268.425:1): state=initialized audit_enabled=0 res=1 Feb 12 19:47:49.785145 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:47:49.785152 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:47:49.785159 kernel: cpuidle: using governor menu Feb 12 19:47:49.785170 kernel: ACPI: bus type PCI registered Feb 12 19:47:49.785178 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:47:49.785184 kernel: dca service started, version 1.12.1 Feb 12 19:47:49.785192 kernel: PCI: Using configuration type 1 for base access Feb 12 19:47:49.785199 kernel: PCI: Using configuration type 1 for extended access Feb 12 19:47:49.785206 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:47:49.785213 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:47:49.785220 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:47:49.785227 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:47:49.785233 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:47:49.785240 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:47:49.785247 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:47:49.785255 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:47:49.785262 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:47:49.785268 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:47:49.785275 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:47:49.785282 kernel: ACPI: Interpreter enabled Feb 12 19:47:49.785288 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 19:47:49.785295 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:47:49.785302 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:47:49.785309 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 19:47:49.785316 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:47:49.785432 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:47:49.785443 kernel: acpiphp: Slot [3] registered Feb 12 19:47:49.785450 kernel: acpiphp: Slot [4] registered Feb 12 19:47:49.785457 kernel: acpiphp: Slot [5] registered Feb 12 19:47:49.785464 kernel: acpiphp: Slot [6] registered Feb 12 19:47:49.785471 kernel: acpiphp: Slot [7] registered Feb 12 19:47:49.785477 kernel: acpiphp: Slot [8] registered Feb 12 19:47:49.785484 kernel: acpiphp: Slot [9] registered Feb 12 19:47:49.785492 kernel: acpiphp: Slot [10] registered Feb 12 19:47:49.785499 kernel: acpiphp: Slot [11] registered Feb 12 19:47:49.785505 kernel: acpiphp: Slot [12] registered Feb 12 19:47:49.785512 kernel: acpiphp: Slot [13] registered Feb 12 19:47:49.785519 kernel: acpiphp: Slot [14] registered Feb 12 19:47:49.785526 kernel: acpiphp: Slot [15] registered Feb 12 19:47:49.785533 kernel: acpiphp: Slot [16] registered Feb 12 19:47:49.785539 kernel: acpiphp: Slot [17] registered Feb 12 19:47:49.785546 kernel: acpiphp: Slot [18] registered Feb 12 19:47:49.785553 kernel: acpiphp: Slot [19] registered Feb 12 19:47:49.785560 kernel: acpiphp: Slot [20] registered Feb 12 19:47:49.785567 kernel: acpiphp: Slot [21] registered Feb 12 19:47:49.785573 kernel: acpiphp: Slot [22] registered Feb 12 19:47:49.785580 kernel: acpiphp: Slot [23] registered Feb 12 19:47:49.785587 kernel: acpiphp: Slot [24] registered Feb 12 19:47:49.785593 kernel: acpiphp: Slot [25] registered Feb 12 19:47:49.785600 kernel: acpiphp: Slot [26] registered Feb 12 19:47:49.785607 kernel: acpiphp: Slot [27] registered Feb 12 19:47:49.785613 kernel: acpiphp: Slot [28] registered Feb 12 19:47:49.785622 kernel: acpiphp: Slot [29] registered Feb 12 19:47:49.785628 kernel: acpiphp: Slot [30] registered Feb 12 19:47:49.785635 kernel: acpiphp: Slot [31] registered Feb 12 19:47:49.785642 kernel: PCI host bridge to bus 0000:00 Feb 12 19:47:49.785717 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 19:47:49.785777 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 19:47:49.785836 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 19:47:49.785896 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Feb 12 19:47:49.785955 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0x87fffffff window] Feb 12 19:47:49.786013 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:47:49.786115 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 19:47:49.786198 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 19:47:49.786280 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 19:47:49.786817 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Feb 12 19:47:49.786896 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 19:47:49.786964 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 19:47:49.787045 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 19:47:49.787115 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 19:47:49.787197 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 19:47:49.787267 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 19:47:49.787336 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Feb 12 19:47:49.787411 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Feb 12 19:47:49.787479 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Feb 12 19:47:49.787546 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc1043000-0xc1043fff] Feb 12 19:47:49.787613 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Feb 12 19:47:49.787680 kernel: pci 0000:00:02.0: BAR 0: assigned to efifb Feb 12 19:47:49.787746 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 19:47:49.787825 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 19:47:49.787894 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0a0-0xc0bf] Feb 12 19:47:49.787965 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Feb 12 19:47:49.788050 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Feb 12 19:47:49.788128 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:47:49.788202 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 19:47:49.788269 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Feb 12 19:47:49.788802 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Feb 12 19:47:49.788896 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:47:49.788968 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 19:47:49.789502 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc1040000-0xc1040fff] Feb 12 19:47:49.789588 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Feb 12 19:47:49.789677 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Feb 12 19:47:49.789687 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 19:47:49.789698 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 19:47:49.789705 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 19:47:49.789712 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 19:47:49.789718 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 19:47:49.789725 kernel: iommu: Default domain type: Translated Feb 12 19:47:49.789732 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:47:49.789799 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 19:47:49.789865 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 19:47:49.789930 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 19:47:49.789941 kernel: vgaarb: loaded Feb 12 19:47:49.789948 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:47:49.789955 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:47:49.789962 kernel: PTP clock support registered Feb 12 19:47:49.789969 kernel: Registered efivars operations Feb 12 19:47:49.789975 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:47:49.789982 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 19:47:49.789989 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Feb 12 19:47:49.789996 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Feb 12 19:47:49.790004 kernel: e820: reserve RAM buffer [mem 0x9b1aa018-0x9bffffff] Feb 12 19:47:49.790010 kernel: e820: reserve RAM buffer [mem 0x9b3f7018-0x9bffffff] Feb 12 19:47:49.790017 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Feb 12 19:47:49.790024 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Feb 12 19:47:49.790041 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 19:47:49.790048 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 19:47:49.790055 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 19:47:49.790062 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:47:49.790069 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:47:49.790077 kernel: pnp: PnP ACPI init Feb 12 19:47:49.790152 kernel: pnp 00:02: [dma 2] Feb 12 19:47:49.790162 kernel: pnp: PnP ACPI: found 6 devices Feb 12 19:47:49.790175 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:47:49.790183 kernel: NET: Registered PF_INET protocol family Feb 12 19:47:49.790190 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:47:49.790197 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:47:49.790203 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:47:49.790212 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:47:49.790219 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:47:49.790225 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:47:49.790232 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:47:49.790239 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:47:49.790246 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:47:49.790253 kernel: NET: Registered PF_XDP protocol family Feb 12 19:47:49.792919 kernel: pci 0000:00:05.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Feb 12 19:47:49.793017 kernel: pci 0000:00:05.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Feb 12 19:47:49.793104 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 19:47:49.793196 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 19:47:49.793269 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 19:47:49.793342 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Feb 12 19:47:49.793414 kernel: pci_bus 0000:00: resource 8 [mem 0x800000000-0x87fffffff window] Feb 12 19:47:49.793496 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 19:47:49.793565 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 19:47:49.793662 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 19:47:49.793674 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:47:49.793697 kernel: Initialise system trusted keyrings Feb 12 19:47:49.793707 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:47:49.793715 kernel: Key type asymmetric registered Feb 12 19:47:49.793724 kernel: Asymmetric key parser 'x509' registered Feb 12 19:47:49.793733 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:47:49.793742 kernel: io scheduler mq-deadline registered Feb 12 19:47:49.793751 kernel: io scheduler kyber registered Feb 12 19:47:49.793762 kernel: io scheduler bfq registered Feb 12 19:47:49.793771 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:47:49.793781 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 19:47:49.793789 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 19:47:49.793796 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 19:47:49.793810 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:47:49.793822 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:47:49.793829 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 19:47:49.793837 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 19:47:49.793845 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 19:47:49.793935 kernel: rtc_cmos 00:05: RTC can wake from S4 Feb 12 19:47:49.793948 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 19:47:49.794022 kernel: rtc_cmos 00:05: registered as rtc0 Feb 12 19:47:49.794120 kernel: rtc_cmos 00:05: setting system clock to 2024-02-12T19:47:49 UTC (1707767269) Feb 12 19:47:49.794203 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Feb 12 19:47:49.794224 kernel: efifb: probing for efifb Feb 12 19:47:49.794232 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Feb 12 19:47:49.794239 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Feb 12 19:47:49.794246 kernel: efifb: scrolling: redraw Feb 12 19:47:49.794259 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:47:49.794271 kernel: Console: switching to colour frame buffer device 160x50 Feb 12 19:47:49.794278 kernel: fb0: EFI VGA frame buffer device Feb 12 19:47:49.794287 kernel: pstore: Registered efi as persistent store backend Feb 12 19:47:49.794295 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:47:49.794302 kernel: Segment Routing with IPv6 Feb 12 19:47:49.794324 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:47:49.794332 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:47:49.794339 kernel: Key type dns_resolver registered Feb 12 19:47:49.794347 kernel: IPI shorthand broadcast: enabled Feb 12 19:47:49.794354 kernel: sched_clock: Marking stable (353175759, 90113703)->(466058950, -22769488) Feb 12 19:47:49.794367 kernel: registered taskstats version 1 Feb 12 19:47:49.794379 kernel: Loading compiled-in X.509 certificates Feb 12 19:47:49.794388 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 19:47:49.794395 kernel: Key type .fscrypt registered Feb 12 19:47:49.794402 kernel: Key type fscrypt-provisioning registered Feb 12 19:47:49.794409 kernel: pstore: Using crash dump compression: deflate Feb 12 19:47:49.794426 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:47:49.794434 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:47:49.794441 kernel: ima: No architecture policies found Feb 12 19:47:49.794448 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:47:49.794456 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:47:49.794464 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:47:49.794471 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:47:49.794489 kernel: Run /init as init process Feb 12 19:47:49.794496 kernel: with arguments: Feb 12 19:47:49.794503 kernel: /init Feb 12 19:47:49.794510 kernel: with environment: Feb 12 19:47:49.794517 kernel: HOME=/ Feb 12 19:47:49.794524 kernel: TERM=linux Feb 12 19:47:49.794531 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:47:49.794551 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:47:49.794561 systemd[1]: Detected virtualization kvm. Feb 12 19:47:49.794569 systemd[1]: Detected architecture x86-64. Feb 12 19:47:49.794577 systemd[1]: Running in initrd. Feb 12 19:47:49.794585 systemd[1]: No hostname configured, using default hostname. Feb 12 19:47:49.794602 systemd[1]: Hostname set to . Feb 12 19:47:49.794610 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:47:49.794619 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:47:49.794626 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:47:49.794634 systemd[1]: Reached target cryptsetup.target. Feb 12 19:47:49.794641 systemd[1]: Reached target paths.target. Feb 12 19:47:49.794649 systemd[1]: Reached target slices.target. Feb 12 19:47:49.794668 systemd[1]: Reached target swap.target. Feb 12 19:47:49.794675 systemd[1]: Reached target timers.target. Feb 12 19:47:49.794683 systemd[1]: Listening on iscsid.socket. Feb 12 19:47:49.794692 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:47:49.794700 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:47:49.794711 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:47:49.794728 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:47:49.794736 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:47:49.794744 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:47:49.794751 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:47:49.794759 systemd[1]: Reached target sockets.target. Feb 12 19:47:49.794778 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:47:49.794786 systemd[1]: Finished network-cleanup.service. Feb 12 19:47:49.794794 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:47:49.794801 systemd[1]: Starting systemd-journald.service... Feb 12 19:47:49.794815 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:47:49.794827 systemd[1]: Starting systemd-resolved.service... Feb 12 19:47:49.794835 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:47:49.794843 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:47:49.794850 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:47:49.794869 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:47:49.794878 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:47:49.794885 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:47:49.794893 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:47:49.794901 kernel: audit: type=1130 audit(1707767269.790:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.794911 systemd-journald[198]: Journal started Feb 12 19:47:49.794951 systemd-journald[198]: Runtime Journal (/run/log/journal/4e496e390751462b9435a15e46e56923) is 6.0M, max 48.4M, 42.4M free. Feb 12 19:47:49.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.796151 systemd[1]: Started systemd-journald.service. Feb 12 19:47:49.780730 systemd-modules-load[199]: Inserted module 'overlay' Feb 12 19:47:49.796965 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:47:49.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.803170 kernel: audit: type=1130 audit(1707767269.796:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.803200 kernel: audit: type=1130 audit(1707767269.798:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.802157 systemd-resolved[200]: Positive Trust Anchors: Feb 12 19:47:49.802172 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:47:49.802198 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:47:49.810459 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:47:49.802468 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:47:49.813977 kernel: audit: type=1130 audit(1707767269.810:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.813991 kernel: Bridge firewalling registered Feb 12 19:47:49.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.814022 dracut-cmdline[215]: dracut-dracut-053 Feb 12 19:47:49.804347 systemd-resolved[200]: Defaulting to hostname 'linux'. Feb 12 19:47:49.805155 systemd[1]: Started systemd-resolved.service. Feb 12 19:47:49.815947 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:47:49.812511 systemd[1]: Reached target nss-lookup.target. Feb 12 19:47:49.813917 systemd-modules-load[199]: Inserted module 'br_netfilter' Feb 12 19:47:49.829055 kernel: SCSI subsystem initialized Feb 12 19:47:49.839455 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:47:49.839490 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:47:49.840512 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:47:49.843540 systemd-modules-load[199]: Inserted module 'dm_multipath' Feb 12 19:47:49.844279 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:47:49.847719 kernel: audit: type=1130 audit(1707767269.844:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.845137 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:47:49.852339 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:47:49.855279 kernel: audit: type=1130 audit(1707767269.852:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.872046 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:47:49.882052 kernel: iscsi: registered transport (tcp) Feb 12 19:47:49.901052 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:47:49.901077 kernel: QLogic iSCSI HBA Driver Feb 12 19:47:49.929606 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:47:49.932545 kernel: audit: type=1130 audit(1707767269.929:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:49.932552 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:47:49.979051 kernel: raid6: avx2x4 gen() 29901 MB/s Feb 12 19:47:49.996042 kernel: raid6: avx2x4 xor() 7478 MB/s Feb 12 19:47:50.013040 kernel: raid6: avx2x2 gen() 32211 MB/s Feb 12 19:47:50.030040 kernel: raid6: avx2x2 xor() 19302 MB/s Feb 12 19:47:50.047040 kernel: raid6: avx2x1 gen() 26472 MB/s Feb 12 19:47:50.064049 kernel: raid6: avx2x1 xor() 15398 MB/s Feb 12 19:47:50.081041 kernel: raid6: sse2x4 gen() 14786 MB/s Feb 12 19:47:50.098041 kernel: raid6: sse2x4 xor() 7135 MB/s Feb 12 19:47:50.115042 kernel: raid6: sse2x2 gen() 16174 MB/s Feb 12 19:47:50.132041 kernel: raid6: sse2x2 xor() 9815 MB/s Feb 12 19:47:50.149041 kernel: raid6: sse2x1 gen() 12402 MB/s Feb 12 19:47:50.166478 kernel: raid6: sse2x1 xor() 7738 MB/s Feb 12 19:47:50.166490 kernel: raid6: using algorithm avx2x2 gen() 32211 MB/s Feb 12 19:47:50.166499 kernel: raid6: .... xor() 19302 MB/s, rmw enabled Feb 12 19:47:50.166507 kernel: raid6: using avx2x2 recovery algorithm Feb 12 19:47:50.178048 kernel: xor: automatically using best checksumming function avx Feb 12 19:47:50.265052 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:47:50.273056 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:47:50.276082 kernel: audit: type=1130 audit(1707767270.273:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:50.276107 kernel: audit: type=1334 audit(1707767270.275:10): prog-id=7 op=LOAD Feb 12 19:47:50.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:50.275000 audit: BPF prog-id=7 op=LOAD Feb 12 19:47:50.276000 audit: BPF prog-id=8 op=LOAD Feb 12 19:47:50.277109 systemd[1]: Starting systemd-udevd.service... Feb 12 19:47:50.288380 systemd-udevd[399]: Using default interface naming scheme 'v252'. Feb 12 19:47:50.292760 systemd[1]: Started systemd-udevd.service. Feb 12 19:47:50.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:50.293798 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:47:50.303434 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Feb 12 19:47:50.326812 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:47:50.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:50.327867 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:47:50.362307 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:47:50.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:50.388058 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Feb 12 19:47:50.402053 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:47:50.405533 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:47:50.405554 kernel: GPT:9289727 != 19775487 Feb 12 19:47:50.405563 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:47:50.405572 kernel: GPT:9289727 != 19775487 Feb 12 19:47:50.405580 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:47:50.405589 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:47:50.407053 kernel: libata version 3.00 loaded. Feb 12 19:47:50.416049 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:47:50.416070 kernel: AES CTR mode by8 optimization enabled Feb 12 19:47:50.421619 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 19:47:50.421749 kernel: scsi host0: ata_piix Feb 12 19:47:50.421843 kernel: scsi host1: ata_piix Feb 12 19:47:50.421925 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Feb 12 19:47:50.422191 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Feb 12 19:47:50.438049 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (446) Feb 12 19:47:50.439437 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:47:50.440800 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:47:50.445539 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:47:50.451973 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:47:50.456021 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:47:50.457947 systemd[1]: Starting disk-uuid.service... Feb 12 19:47:50.463909 disk-uuid[513]: Primary Header is updated. Feb 12 19:47:50.463909 disk-uuid[513]: Secondary Entries is updated. Feb 12 19:47:50.463909 disk-uuid[513]: Secondary Header is updated. Feb 12 19:47:50.466420 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:47:50.469047 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:47:50.578057 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 12 19:47:50.578138 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 12 19:47:50.609046 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 12 19:47:50.609206 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:47:50.626091 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Feb 12 19:47:51.469576 disk-uuid[514]: The operation has completed successfully. Feb 12 19:47:51.470558 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:47:51.492529 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:47:51.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.492603 systemd[1]: Finished disk-uuid.service. Feb 12 19:47:51.497797 systemd[1]: Starting verity-setup.service... Feb 12 19:47:51.509050 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Feb 12 19:47:51.526217 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:47:51.527785 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:47:51.529653 systemd[1]: Finished verity-setup.service. Feb 12 19:47:51.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.584049 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:47:51.584093 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:47:51.584699 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:47:51.585246 systemd[1]: Starting ignition-setup.service... Feb 12 19:47:51.586956 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:47:51.592566 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:47:51.592588 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:47:51.592597 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:47:51.600328 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:47:51.607379 systemd[1]: Finished ignition-setup.service. Feb 12 19:47:51.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.608445 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:47:51.640675 ignition[621]: Ignition 2.14.0 Feb 12 19:47:51.641443 ignition[621]: Stage: fetch-offline Feb 12 19:47:51.641787 ignition[621]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:47:51.641795 ignition[621]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:47:51.641884 ignition[621]: parsed url from cmdline: "" Feb 12 19:47:51.641887 ignition[621]: no config URL provided Feb 12 19:47:51.641891 ignition[621]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:47:51.641897 ignition[621]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:47:51.641912 ignition[621]: op(1): [started] loading QEMU firmware config module Feb 12 19:47:51.641916 ignition[621]: op(1): executing: "modprobe" "qemu_fw_cfg" Feb 12 19:47:51.646343 ignition[621]: op(1): [finished] loading QEMU firmware config module Feb 12 19:47:51.653742 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:47:51.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.656000 audit: BPF prog-id=9 op=LOAD Feb 12 19:47:51.656753 systemd[1]: Starting systemd-networkd.service... Feb 12 19:47:51.658297 ignition[621]: parsing config with SHA512: c7571370e2b6b743136a7723d63c306d7da70376cd58971c1ee22bf5b0047730e62176a80f439f6e40be690693ae2a7bdf2d3a04dc7e6e308f33f5f8a56ff50c Feb 12 19:47:51.675124 unknown[621]: fetched base config from "system" Feb 12 19:47:51.675522 unknown[621]: fetched user config from "qemu" Feb 12 19:47:51.676053 systemd-networkd[707]: lo: Link UP Feb 12 19:47:51.676056 systemd-networkd[707]: lo: Gained carrier Feb 12 19:47:51.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.676431 systemd-networkd[707]: Enumeration completed Feb 12 19:47:51.676497 systemd[1]: Started systemd-networkd.service. Feb 12 19:47:51.676688 systemd-networkd[707]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:47:51.680624 ignition[621]: fetch-offline: fetch-offline passed Feb 12 19:47:51.677362 systemd-networkd[707]: eth0: Link UP Feb 12 19:47:51.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.680713 ignition[621]: Ignition finished successfully Feb 12 19:47:51.677364 systemd-networkd[707]: eth0: Gained carrier Feb 12 19:47:51.677762 systemd[1]: Reached target network.target. Feb 12 19:47:51.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.679344 systemd[1]: Starting iscsiuio.service... Feb 12 19:47:51.681797 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:47:51.682740 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 12 19:47:51.683291 systemd[1]: Starting ignition-kargs.service... Feb 12 19:47:51.684494 systemd[1]: Started iscsiuio.service. Feb 12 19:47:51.685980 systemd[1]: Starting iscsid.service... Feb 12 19:47:51.689714 iscsid[713]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:47:51.689714 iscsid[713]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:47:51.689714 iscsid[713]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:47:51.689714 iscsid[713]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:47:51.689714 iscsid[713]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:47:51.689714 iscsid[713]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:47:51.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.690590 systemd[1]: Started iscsid.service. Feb 12 19:47:51.691960 ignition[711]: Ignition 2.14.0 Feb 12 19:47:51.692110 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:47:51.691965 ignition[711]: Stage: kargs Feb 12 19:47:51.695888 systemd[1]: Finished ignition-kargs.service. Feb 12 19:47:51.692053 ignition[711]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:47:51.696108 systemd-networkd[707]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:47:51.692061 ignition[711]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:47:51.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.697984 systemd[1]: Starting ignition-disks.service... Feb 12 19:47:51.692928 ignition[711]: kargs: kargs passed Feb 12 19:47:51.702971 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:47:51.692956 ignition[711]: Ignition finished successfully Feb 12 19:47:51.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.704668 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:47:51.706585 ignition[722]: Ignition 2.14.0 Feb 12 19:47:51.705809 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:47:51.706590 ignition[722]: Stage: disks Feb 12 19:47:51.706230 systemd[1]: Reached target remote-fs.target. Feb 12 19:47:51.706681 ignition[722]: no configs at "/usr/lib/ignition/base.d" Feb 12 19:47:51.706989 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:47:51.706689 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:47:51.708799 systemd[1]: Finished ignition-disks.service. Feb 12 19:47:51.707571 ignition[722]: disks: disks passed Feb 12 19:47:51.710014 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:47:51.707597 ignition[722]: Ignition finished successfully Feb 12 19:47:51.710899 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:47:51.711342 systemd[1]: Reached target local-fs.target. Feb 12 19:47:51.711555 systemd[1]: Reached target sysinit.target. Feb 12 19:47:51.711771 systemd[1]: Reached target basic.target. Feb 12 19:47:51.726156 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:47:51.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.727296 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:47:51.737940 systemd-fsck[739]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 12 19:47:51.742206 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:47:51.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.743735 systemd[1]: Mounting sysroot.mount... Feb 12 19:47:51.749047 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:47:51.749503 systemd[1]: Mounted sysroot.mount. Feb 12 19:47:51.750053 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:47:51.751817 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:47:51.752495 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 19:47:51.752524 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:47:51.752542 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:47:51.753905 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:47:51.755295 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:47:51.759058 initrd-setup-root[749]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:47:51.762357 initrd-setup-root[757]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:47:51.764831 initrd-setup-root[765]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:47:51.767519 initrd-setup-root[773]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:47:51.787863 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:47:51.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.789084 systemd[1]: Starting ignition-mount.service... Feb 12 19:47:51.790597 systemd[1]: Starting sysroot-boot.service... Feb 12 19:47:51.793617 bash[790]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:47:51.801024 ignition[791]: INFO : Ignition 2.14.0 Feb 12 19:47:51.801024 ignition[791]: INFO : Stage: mount Feb 12 19:47:51.802368 ignition[791]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:47:51.802368 ignition[791]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:47:51.802368 ignition[791]: INFO : mount: mount passed Feb 12 19:47:51.802368 ignition[791]: INFO : Ignition finished successfully Feb 12 19:47:51.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:51.802992 systemd[1]: Finished ignition-mount.service. Feb 12 19:47:51.809011 systemd[1]: Finished sysroot-boot.service. Feb 12 19:47:51.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:52.535577 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:47:52.541503 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (800) Feb 12 19:47:52.541532 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:47:52.541542 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:47:52.542060 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:47:52.545417 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:47:52.546405 systemd[1]: Starting ignition-files.service... Feb 12 19:47:52.559236 ignition[820]: INFO : Ignition 2.14.0 Feb 12 19:47:52.559236 ignition[820]: INFO : Stage: files Feb 12 19:47:52.560367 ignition[820]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:47:52.560367 ignition[820]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:47:52.562597 ignition[820]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:47:52.563701 ignition[820]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:47:52.563701 ignition[820]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:47:52.566422 ignition[820]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:47:52.567386 ignition[820]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:47:52.568614 unknown[820]: wrote ssh authorized keys file for user: core Feb 12 19:47:52.569356 ignition[820]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:47:52.570534 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:47:52.571820 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 19:47:52.808170 systemd-networkd[707]: eth0: Gained IPv6LL Feb 12 19:47:53.033473 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:47:53.194284 ignition[820]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 19:47:53.196192 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:47:53.196192 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:47:53.196192 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:47:53.612793 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:47:53.679045 ignition[820]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 19:47:53.681412 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:47:53.681412 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:47:53.681412 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:47:53.757653 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:47:53.983605 ignition[820]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 12 19:47:53.985543 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:47:53.985543 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:47:53.987716 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:47:54.033519 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:47:54.470881 ignition[820]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 12 19:47:54.473131 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:47:54.473131 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:47:54.473131 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:47:54.473131 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:47:54.473131 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:47:54.473131 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:47:54.473131 ignition[820]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(a): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(a): op(b): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(a): op(b): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(a): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(c): [started] processing unit "prepare-critools.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(c): op(d): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(c): op(d): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(c): [finished] processing unit "prepare-critools.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(e): [started] processing unit "coreos-metadata.service" Feb 12 19:47:54.473131 ignition[820]: INFO : files: op(e): op(f): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:47:54.493444 ignition[820]: INFO : files: op(e): op(f): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Feb 12 19:47:54.493444 ignition[820]: INFO : files: op(e): [finished] processing unit "coreos-metadata.service" Feb 12 19:47:54.493444 ignition[820]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Feb 12 19:47:54.493444 ignition[820]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:47:54.510340 ignition[820]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Feb 12 19:47:54.511435 ignition[820]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Feb 12 19:47:54.511435 ignition[820]: INFO : files: op(12): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:47:54.511435 ignition[820]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:47:54.511435 ignition[820]: INFO : files: op(13): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:47:54.511435 ignition[820]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:47:54.511435 ignition[820]: INFO : files: createResultFile: createFiles: op(14): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:47:54.511435 ignition[820]: INFO : files: createResultFile: createFiles: op(14): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:47:54.511435 ignition[820]: INFO : files: files passed Feb 12 19:47:54.511435 ignition[820]: INFO : Ignition finished successfully Feb 12 19:47:54.520768 systemd[1]: Finished ignition-files.service. Feb 12 19:47:54.524465 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 19:47:54.524485 kernel: audit: type=1130 audit(1707767274.521:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.522248 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:47:54.524760 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:47:54.527654 initrd-setup-root-after-ignition[845]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Feb 12 19:47:54.525543 systemd[1]: Starting ignition-quench.service... Feb 12 19:47:54.530210 initrd-setup-root-after-ignition[847]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:47:54.530662 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:47:54.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.531825 systemd[1]: Reached target ignition-complete.target. Feb 12 19:47:54.535993 kernel: audit: type=1130 audit(1707767274.531:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.535699 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:47:54.537203 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:47:54.537281 systemd[1]: Finished ignition-quench.service. Feb 12 19:47:54.542903 kernel: audit: type=1130 audit(1707767274.537:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.542918 kernel: audit: type=1131 audit(1707767274.537:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.546489 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:47:54.546565 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:47:54.551322 kernel: audit: type=1130 audit(1707767274.546:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.551342 kernel: audit: type=1131 audit(1707767274.546:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.547024 systemd[1]: Reached target initrd-fs.target. Feb 12 19:47:54.552606 systemd[1]: Reached target initrd.target. Feb 12 19:47:54.553564 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:47:54.555012 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:47:54.565128 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:47:54.568176 kernel: audit: type=1130 audit(1707767274.565:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.568214 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:47:54.577199 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:47:54.577571 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:47:54.577794 systemd[1]: Stopped target timers.target. Feb 12 19:47:54.578004 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:47:54.583174 kernel: audit: type=1131 audit(1707767274.580:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.578098 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:47:54.580472 systemd[1]: Stopped target initrd.target. Feb 12 19:47:54.583508 systemd[1]: Stopped target basic.target. Feb 12 19:47:54.583714 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:47:54.583924 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:47:54.584263 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:47:54.587263 systemd[1]: Stopped target remote-fs.target. Feb 12 19:47:54.588943 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:47:54.589440 systemd[1]: Stopped target sysinit.target. Feb 12 19:47:54.589655 systemd[1]: Stopped target local-fs.target. Feb 12 19:47:54.589868 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:47:54.590101 systemd[1]: Stopped target swap.target. Feb 12 19:47:54.593410 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:47:54.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.593486 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:47:54.597744 kernel: audit: type=1131 audit(1707767274.593:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.593847 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:47:54.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.596234 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:47:54.601511 kernel: audit: type=1131 audit(1707767274.597:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.596307 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:47:54.598117 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:47:54.598193 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:47:54.601336 systemd[1]: Stopped target paths.target. Feb 12 19:47:54.601637 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:47:54.606090 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:47:54.607417 systemd[1]: Stopped target slices.target. Feb 12 19:47:54.608545 systemd[1]: Stopped target sockets.target. Feb 12 19:47:54.609620 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:47:54.610451 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:47:54.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.611849 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:47:54.612544 systemd[1]: Stopped ignition-files.service. Feb 12 19:47:54.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.614291 systemd[1]: Stopping ignition-mount.service... Feb 12 19:47:54.615441 systemd[1]: Stopping iscsid.service... Feb 12 19:47:54.616349 iscsid[713]: iscsid shutting down. Feb 12 19:47:54.617518 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:47:54.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.618060 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:47:54.620960 ignition[861]: INFO : Ignition 2.14.0 Feb 12 19:47:54.620960 ignition[861]: INFO : Stage: umount Feb 12 19:47:54.620960 ignition[861]: INFO : no configs at "/usr/lib/ignition/base.d" Feb 12 19:47:54.620960 ignition[861]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Feb 12 19:47:54.618167 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:47:54.624657 ignition[861]: INFO : umount: umount passed Feb 12 19:47:54.624657 ignition[861]: INFO : Ignition finished successfully Feb 12 19:47:54.618915 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:47:54.618994 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:47:54.627484 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:47:54.628134 systemd[1]: Stopped iscsid.service. Feb 12 19:47:54.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.629422 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:47:54.630108 systemd[1]: Stopped ignition-mount.service. Feb 12 19:47:54.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.632159 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:47:54.633174 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:47:54.633820 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:47:54.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.635143 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:47:54.635210 systemd[1]: Closed iscsid.socket. Feb 12 19:47:54.636682 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:47:54.636714 systemd[1]: Stopped ignition-disks.service. Feb 12 19:47:54.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.638417 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:47:54.638447 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:47:54.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.640061 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:47:54.640090 systemd[1]: Stopped ignition-setup.service. Feb 12 19:47:54.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.641635 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:47:54.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.641662 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:47:54.642906 systemd[1]: Stopping iscsiuio.service... Feb 12 19:47:54.644452 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:47:54.645117 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:47:54.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.646309 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:47:54.646920 systemd[1]: Stopped iscsiuio.service. Feb 12 19:47:54.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.648587 systemd[1]: Stopped target network.target. Feb 12 19:47:54.649612 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:47:54.649639 systemd[1]: Closed iscsiuio.socket. Feb 12 19:47:54.651137 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:47:54.652275 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:47:54.655061 systemd-networkd[707]: eth0: DHCPv6 lease lost Feb 12 19:47:54.655934 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:47:54.656630 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:47:54.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.658194 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:47:54.659000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:47:54.658225 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:47:54.660367 systemd[1]: Stopping network-cleanup.service... Feb 12 19:47:54.661428 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:47:54.661464 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:47:54.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.663334 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:47:54.663365 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:47:54.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.665070 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:47:54.665113 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:47:54.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.666980 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:47:54.668714 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:47:54.669861 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:47:54.669936 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:47:54.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.673000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:47:54.673920 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:47:54.674622 systemd[1]: Stopped network-cleanup.service. Feb 12 19:47:54.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.676339 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:47:54.677069 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:47:54.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.678375 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:47:54.678408 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:47:54.680130 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:47:54.680158 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:47:54.681831 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:47:54.681866 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:47:54.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.683517 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:47:54.683545 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:47:54.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.685174 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:47:54.685820 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:47:54.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.687490 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:47:54.688640 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:47:54.688676 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:47:54.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.690598 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:47:54.690637 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:47:54.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.692344 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:47:54.692375 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:47:54.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.694737 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:47:54.695974 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:47:54.696740 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:47:54.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:54.698052 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:47:54.699753 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:47:54.715076 systemd[1]: Switching root. Feb 12 19:47:54.735285 systemd-journald[198]: Journal stopped Feb 12 19:47:57.453941 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Feb 12 19:47:57.454000 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:47:57.454012 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:47:57.454022 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:47:57.454043 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:47:57.454053 kernel: SELinux: policy capability open_perms=1 Feb 12 19:47:57.454063 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:47:57.454072 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:47:57.454081 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:47:57.454096 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:47:57.454110 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:47:57.454123 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:47:57.454133 systemd[1]: Successfully loaded SELinux policy in 39.003ms. Feb 12 19:47:57.454152 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.066ms. Feb 12 19:47:57.454164 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:47:57.454175 systemd[1]: Detected virtualization kvm. Feb 12 19:47:57.454187 systemd[1]: Detected architecture x86-64. Feb 12 19:47:57.454197 systemd[1]: Detected first boot. Feb 12 19:47:57.454207 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:47:57.454217 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:47:57.454228 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:47:57.454238 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:47:57.454249 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:47:57.454260 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:47:57.454275 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:47:57.454287 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:47:57.454297 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:47:57.454307 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:47:57.454317 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:47:57.454327 systemd[1]: Created slice system-getty.slice. Feb 12 19:47:57.454337 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:47:57.454348 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:47:57.454358 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:47:57.454369 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:47:57.454379 systemd[1]: Created slice user.slice. Feb 12 19:47:57.454389 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:47:57.454399 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:47:57.454409 systemd[1]: Set up automount boot.automount. Feb 12 19:47:57.454419 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:47:57.454429 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:47:57.454440 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:47:57.454454 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:47:57.454464 systemd[1]: Reached target integritysetup.target. Feb 12 19:47:57.454474 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:47:57.454485 systemd[1]: Reached target remote-fs.target. Feb 12 19:47:57.454494 systemd[1]: Reached target slices.target. Feb 12 19:47:57.454505 systemd[1]: Reached target swap.target. Feb 12 19:47:57.454515 systemd[1]: Reached target torcx.target. Feb 12 19:47:57.454525 systemd[1]: Reached target veritysetup.target. Feb 12 19:47:57.454536 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:47:57.454547 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:47:57.454557 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:47:57.454567 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:47:57.454577 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:47:57.454587 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:47:57.454597 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:47:57.454607 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:47:57.454620 systemd[1]: Mounting media.mount... Feb 12 19:47:57.454631 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:47:57.454641 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:47:57.454653 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:47:57.454663 systemd[1]: Mounting tmp.mount... Feb 12 19:47:57.454673 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:47:57.454683 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:47:57.454694 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:47:57.454704 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:47:57.454714 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:47:57.454726 systemd[1]: Starting modprobe@drm.service... Feb 12 19:47:57.454736 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:47:57.454748 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:47:57.454758 systemd[1]: Starting modprobe@loop.service... Feb 12 19:47:57.454768 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:47:57.454779 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:47:57.454789 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:47:57.454799 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:47:57.454810 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:47:57.454820 systemd[1]: Stopped systemd-journald.service. Feb 12 19:47:57.454831 kernel: loop: module loaded Feb 12 19:47:57.454841 systemd[1]: Starting systemd-journald.service... Feb 12 19:47:57.454851 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:47:57.454862 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:47:57.454872 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:47:57.454883 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:47:57.454893 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:47:57.454903 systemd[1]: Stopped verity-setup.service. Feb 12 19:47:57.454913 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:47:57.454923 kernel: fuse: init (API version 7.34) Feb 12 19:47:57.454935 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:47:57.454946 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:47:57.454956 systemd[1]: Mounted media.mount. Feb 12 19:47:57.454975 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:47:57.454985 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:47:57.454998 systemd-journald[971]: Journal started Feb 12 19:47:57.455043 systemd-journald[971]: Runtime Journal (/run/log/journal/4e496e390751462b9435a15e46e56923) is 6.0M, max 48.4M, 42.4M free. Feb 12 19:47:54.793000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:47:55.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:47:55.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:47:55.320000 audit: BPF prog-id=10 op=LOAD Feb 12 19:47:55.320000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:47:55.320000 audit: BPF prog-id=11 op=LOAD Feb 12 19:47:55.320000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:47:55.348000 audit[894]: AVC avc: denied { associate } for pid=894 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:47:55.348000 audit[894]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001c58ac a1=c000146de0 a2=c00014fac0 a3=32 items=0 ppid=877 pid=894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.348000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:47:55.349000 audit[894]: AVC avc: denied { associate } for pid=894 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:47:55.349000 audit[894]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001c5985 a2=1ed a3=0 items=2 ppid=877 pid=894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:55.349000 audit: CWD cwd="/" Feb 12 19:47:55.349000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:55.349000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:55.349000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:47:57.356000 audit: BPF prog-id=12 op=LOAD Feb 12 19:47:57.356000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:47:57.356000 audit: BPF prog-id=13 op=LOAD Feb 12 19:47:57.356000 audit: BPF prog-id=14 op=LOAD Feb 12 19:47:57.356000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:47:57.356000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:47:57.357000 audit: BPF prog-id=15 op=LOAD Feb 12 19:47:57.357000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:47:57.357000 audit: BPF prog-id=16 op=LOAD Feb 12 19:47:57.357000 audit: BPF prog-id=17 op=LOAD Feb 12 19:47:57.357000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:47:57.357000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:47:57.357000 audit: BPF prog-id=18 op=LOAD Feb 12 19:47:57.357000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:47:57.357000 audit: BPF prog-id=19 op=LOAD Feb 12 19:47:57.358000 audit: BPF prog-id=20 op=LOAD Feb 12 19:47:57.358000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:47:57.358000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:47:57.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.367000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:47:57.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.435000 audit: BPF prog-id=21 op=LOAD Feb 12 19:47:57.435000 audit: BPF prog-id=22 op=LOAD Feb 12 19:47:57.435000 audit: BPF prog-id=23 op=LOAD Feb 12 19:47:57.435000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:47:57.435000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:47:57.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.452000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:47:57.452000 audit[971]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe51c084d0 a2=4000 a3=7ffe51c0856c items=0 ppid=1 pid=971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:57.452000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:47:57.354831 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:47:55.346635 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:47:57.354841 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:47:57.456361 systemd[1]: Started systemd-journald.service. Feb 12 19:47:55.346826 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:47:57.358336 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:47:55.346841 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:47:55.346868 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:47:55.346877 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:47:55.346902 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:47:55.346913 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:47:55.347137 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:47:55.347169 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:47:57.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:55.347180 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:47:55.347446 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:47:55.347474 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:47:55.347489 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:47:57.457192 systemd[1]: Mounted tmp.mount. Feb 12 19:47:55.347501 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:47:55.347514 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:47:55.347525 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:47:57.108596 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:47:57.108841 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:47:57.108931 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:47:57.109099 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:47:57.109144 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:47:57.109200 /usr/lib/systemd/system-generators/torcx-generator[894]: time="2024-02-12T19:47:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:47:57.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.457995 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:47:57.458765 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:47:57.458924 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:47:57.460396 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:47:57.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.461846 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:47:57.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.462688 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:47:57.462881 systemd[1]: Finished modprobe@drm.service. Feb 12 19:47:57.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.463637 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:47:57.463821 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:47:57.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.464660 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:47:57.464862 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:47:57.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.465644 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:47:57.465850 systemd[1]: Finished modprobe@loop.service. Feb 12 19:47:57.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.466762 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:47:57.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.467670 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:47:57.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.468683 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:47:57.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.469549 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:47:57.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.470601 systemd[1]: Reached target network-pre.target. Feb 12 19:47:57.472389 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:47:57.473873 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:47:57.474440 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:47:57.475744 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:47:57.477221 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:47:57.478181 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:47:57.480136 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:47:57.480816 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:47:57.481837 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:47:57.482302 systemd-journald[971]: Time spent on flushing to /var/log/journal/4e496e390751462b9435a15e46e56923 is 13.630ms for 1176 entries. Feb 12 19:47:57.482302 systemd-journald[971]: System Journal (/var/log/journal/4e496e390751462b9435a15e46e56923) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:47:57.500775 systemd-journald[971]: Received client request to flush runtime journal. Feb 12 19:47:57.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.484190 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:47:57.487242 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:47:57.487955 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:47:57.489534 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:47:57.490283 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:47:57.498438 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:47:57.499907 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:47:57.501281 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:47:57.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.502760 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:47:57.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.505686 udevadm[998]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:47:57.507003 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:47:57.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.508595 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:47:57.522432 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:47:57.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.882291 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:47:57.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.883000 audit: BPF prog-id=24 op=LOAD Feb 12 19:47:57.883000 audit: BPF prog-id=25 op=LOAD Feb 12 19:47:57.883000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:47:57.883000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:47:57.884317 systemd[1]: Starting systemd-udevd.service... Feb 12 19:47:57.899586 systemd-udevd[1002]: Using default interface naming scheme 'v252'. Feb 12 19:47:57.910777 systemd[1]: Started systemd-udevd.service. Feb 12 19:47:57.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.912000 audit: BPF prog-id=26 op=LOAD Feb 12 19:47:57.912840 systemd[1]: Starting systemd-networkd.service... Feb 12 19:47:57.918000 audit: BPF prog-id=27 op=LOAD Feb 12 19:47:57.918000 audit: BPF prog-id=28 op=LOAD Feb 12 19:47:57.918000 audit: BPF prog-id=29 op=LOAD Feb 12 19:47:57.919078 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:47:57.930686 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:47:57.946603 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:47:57.947391 systemd[1]: Started systemd-userdbd.service. Feb 12 19:47:57.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.970057 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 19:47:57.974414 kernel: ACPI: button: Power Button [PWRF] Feb 12 19:47:57.978000 audit[1012]: AVC avc: denied { confidentiality } for pid=1012 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:47:57.978000 audit[1012]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559c010c2e40 a1=32194 a2=7fb02e87ebc5 a3=5 items=108 ppid=1002 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:57.978000 audit: CWD cwd="/" Feb 12 19:47:57.978000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=1 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=2 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=3 name=(null) inode=15464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=4 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=5 name=(null) inode=15465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=6 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=7 name=(null) inode=15466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=8 name=(null) inode=15466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=9 name=(null) inode=15467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=10 name=(null) inode=15466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=11 name=(null) inode=15468 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=12 name=(null) inode=15466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=13 name=(null) inode=15469 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=14 name=(null) inode=15466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=15 name=(null) inode=15470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=16 name=(null) inode=15466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=17 name=(null) inode=15471 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=18 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=19 name=(null) inode=15472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=20 name=(null) inode=15472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=21 name=(null) inode=15473 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=22 name=(null) inode=15472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=23 name=(null) inode=15474 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=24 name=(null) inode=15472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=25 name=(null) inode=15475 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=26 name=(null) inode=15472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=27 name=(null) inode=15476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=28 name=(null) inode=15472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=29 name=(null) inode=15477 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.989066 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 Feb 12 19:47:57.978000 audit: PATH item=30 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=31 name=(null) inode=15478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=32 name=(null) inode=15478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=33 name=(null) inode=15479 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=34 name=(null) inode=15478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=35 name=(null) inode=15480 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=36 name=(null) inode=15478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=37 name=(null) inode=15481 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=38 name=(null) inode=15478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=39 name=(null) inode=15482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=40 name=(null) inode=15478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=41 name=(null) inode=15483 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=42 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=43 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=44 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=45 name=(null) inode=15485 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=46 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=47 name=(null) inode=15486 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=48 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=49 name=(null) inode=15487 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=50 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=51 name=(null) inode=15488 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=52 name=(null) inode=15484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=53 name=(null) inode=15489 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=55 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=56 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=57 name=(null) inode=15491 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=58 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=59 name=(null) inode=15492 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=60 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=61 name=(null) inode=15493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=62 name=(null) inode=15493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=63 name=(null) inode=15494 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=64 name=(null) inode=15493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=65 name=(null) inode=15495 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=66 name=(null) inode=15493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=67 name=(null) inode=15496 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=68 name=(null) inode=15493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=69 name=(null) inode=15497 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=70 name=(null) inode=15493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=71 name=(null) inode=15498 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=72 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=73 name=(null) inode=15499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=74 name=(null) inode=15499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=75 name=(null) inode=15500 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=76 name=(null) inode=15499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=77 name=(null) inode=15501 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=78 name=(null) inode=15499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=79 name=(null) inode=15502 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=80 name=(null) inode=15499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=81 name=(null) inode=15503 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=82 name=(null) inode=15499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=83 name=(null) inode=15504 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=84 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=85 name=(null) inode=15505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=86 name=(null) inode=15505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=87 name=(null) inode=15506 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=88 name=(null) inode=15505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=89 name=(null) inode=15507 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=90 name=(null) inode=15505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=91 name=(null) inode=15508 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=92 name=(null) inode=15505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=93 name=(null) inode=15509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=94 name=(null) inode=15505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=95 name=(null) inode=15510 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=96 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=97 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=98 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=99 name=(null) inode=15512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=100 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=101 name=(null) inode=15513 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=102 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=103 name=(null) inode=15514 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=104 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=105 name=(null) inode=15515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=106 name=(null) inode=15511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PATH item=107 name=(null) inode=15516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:57.978000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:47:57.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:57.990404 systemd-networkd[1011]: lo: Link UP Feb 12 19:47:57.990408 systemd-networkd[1011]: lo: Gained carrier Feb 12 19:47:57.990730 systemd-networkd[1011]: Enumeration completed Feb 12 19:47:57.990805 systemd[1]: Started systemd-networkd.service. Feb 12 19:47:57.990813 systemd-networkd[1011]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:47:57.992237 systemd-networkd[1011]: eth0: Link UP Feb 12 19:47:57.992240 systemd-networkd[1011]: eth0: Gained carrier Feb 12 19:47:58.004143 systemd-networkd[1011]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Feb 12 19:47:58.021051 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 19:47:58.025058 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:47:58.069338 kernel: kvm: Nested Virtualization enabled Feb 12 19:47:58.069515 kernel: SVM: kvm: Nested Paging enabled Feb 12 19:47:58.069531 kernel: SVM: Virtual VMLOAD VMSAVE supported Feb 12 19:47:58.069544 kernel: SVM: Virtual GIF supported Feb 12 19:47:58.084054 kernel: EDAC MC: Ver: 3.0.0 Feb 12 19:47:58.102322 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:47:58.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.104012 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:47:58.110925 lvm[1038]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:47:58.141716 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:47:58.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.142509 systemd[1]: Reached target cryptsetup.target. Feb 12 19:47:58.144203 systemd[1]: Starting lvm2-activation.service... Feb 12 19:47:58.147395 lvm[1039]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:47:58.174254 systemd[1]: Finished lvm2-activation.service. Feb 12 19:47:58.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.175005 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:47:58.175623 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:47:58.175646 systemd[1]: Reached target local-fs.target. Feb 12 19:47:58.176247 systemd[1]: Reached target machines.target. Feb 12 19:47:58.177774 systemd[1]: Starting ldconfig.service... Feb 12 19:47:58.178493 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:47:58.178538 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:58.179361 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:47:58.180704 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:47:58.182414 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:47:58.183194 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:47:58.183250 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:47:58.184275 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:47:58.185237 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1041 (bootctl) Feb 12 19:47:58.186221 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:47:58.198007 systemd-tmpfiles[1044]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:47:58.198340 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:47:58.198493 systemd-tmpfiles[1044]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:47:58.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.199983 systemd-tmpfiles[1044]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:47:58.411388 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:47:58.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.415533 systemd-fsck[1049]: fsck.fat 4.2 (2021-01-31) Feb 12 19:47:58.415533 systemd-fsck[1049]: /dev/vda1: 790 files, 115362/258078 clusters Feb 12 19:47:58.416837 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:47:58.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.449969 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:47:58.451173 systemd[1]: Mounting boot.mount... Feb 12 19:47:58.456956 systemd[1]: Mounted boot.mount. Feb 12 19:47:58.462968 ldconfig[1040]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:47:58.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.467117 systemd[1]: Finished ldconfig.service. Feb 12 19:47:58.467853 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:47:58.511956 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:47:58.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.513687 systemd[1]: Starting audit-rules.service... Feb 12 19:47:58.515041 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:47:58.516584 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:47:58.517000 audit: BPF prog-id=30 op=LOAD Feb 12 19:47:58.519000 audit: BPF prog-id=31 op=LOAD Feb 12 19:47:58.518542 systemd[1]: Starting systemd-resolved.service... Feb 12 19:47:58.520763 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:47:58.522221 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:47:58.523809 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:47:58.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.524546 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:47:58.526000 audit[1063]: SYSTEM_BOOT pid=1063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.529054 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:47:58.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.534450 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:47:58.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:58.536128 systemd[1]: Starting systemd-update-done.service... Feb 12 19:47:58.540000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:47:58.540000 audit[1073]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd81dbe660 a2=420 a3=0 items=0 ppid=1052 pid=1073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:58.540000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:47:58.541094 augenrules[1073]: No rules Feb 12 19:47:58.541459 systemd[1]: Finished audit-rules.service. Feb 12 19:47:58.542184 systemd[1]: Finished systemd-update-done.service. Feb 12 19:47:58.570306 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:47:58.571054 systemd[1]: Reached target time-set.target. Feb 12 19:47:57.872401 systemd-timesyncd[1059]: Contacted time server 10.0.0.1:123 (10.0.0.1). Feb 12 19:47:57.891116 systemd-journald[971]: Time jumped backwards, rotating. Feb 12 19:47:57.872441 systemd-timesyncd[1059]: Initial clock synchronization to Mon 2024-02-12 19:47:57.872323 UTC. Feb 12 19:47:57.873959 systemd-resolved[1058]: Positive Trust Anchors: Feb 12 19:47:57.873968 systemd-resolved[1058]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:47:57.873994 systemd-resolved[1058]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:47:57.882085 systemd-resolved[1058]: Defaulting to hostname 'linux'. Feb 12 19:47:57.883432 systemd[1]: Started systemd-resolved.service. Feb 12 19:47:57.884130 systemd[1]: Reached target network.target. Feb 12 19:47:57.884714 systemd[1]: Reached target nss-lookup.target. Feb 12 19:47:57.885330 systemd[1]: Reached target sysinit.target. Feb 12 19:47:57.885912 systemd[1]: Started motdgen.path. Feb 12 19:47:57.886417 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:47:57.887242 systemd[1]: Started logrotate.timer. Feb 12 19:47:57.887819 systemd[1]: Started mdadm.timer. Feb 12 19:47:57.888378 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:47:57.889092 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:47:57.889111 systemd[1]: Reached target paths.target. Feb 12 19:47:57.889688 systemd[1]: Reached target timers.target. Feb 12 19:47:57.890525 systemd[1]: Listening on dbus.socket. Feb 12 19:47:57.891851 systemd[1]: Starting docker.socket... Feb 12 19:47:57.894092 systemd[1]: Listening on sshd.socket. Feb 12 19:47:57.894723 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:57.895022 systemd[1]: Listening on docker.socket. Feb 12 19:47:57.895616 systemd[1]: Reached target sockets.target. Feb 12 19:47:57.896147 systemd[1]: Reached target basic.target. Feb 12 19:47:57.896704 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:47:57.896725 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:47:57.897470 systemd[1]: Starting containerd.service... Feb 12 19:47:57.898757 systemd[1]: Starting dbus.service... Feb 12 19:47:57.900011 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:47:57.901504 systemd[1]: Starting extend-filesystems.service... Feb 12 19:47:57.902237 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:47:57.903020 systemd[1]: Starting motdgen.service... Feb 12 19:47:57.904074 jq[1084]: false Feb 12 19:47:57.904292 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:47:57.906303 systemd[1]: Starting prepare-critools.service... Feb 12 19:47:57.907841 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:47:57.909479 systemd[1]: Starting sshd-keygen.service... Feb 12 19:47:57.912266 systemd[1]: Starting systemd-logind.service... Feb 12 19:47:57.912896 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:57.912930 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:47:57.913244 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:47:57.915433 systemd[1]: Starting update-engine.service... Feb 12 19:47:57.924098 extend-filesystems[1085]: Found sr0 Feb 12 19:47:57.924098 extend-filesystems[1085]: Found vda Feb 12 19:47:57.924098 extend-filesystems[1085]: Found vda1 Feb 12 19:47:57.924098 extend-filesystems[1085]: Found vda2 Feb 12 19:47:57.924098 extend-filesystems[1085]: Found vda3 Feb 12 19:47:57.924098 extend-filesystems[1085]: Found usr Feb 12 19:47:57.924098 extend-filesystems[1085]: Found vda4 Feb 12 19:47:57.924098 extend-filesystems[1085]: Found vda6 Feb 12 19:47:57.924098 extend-filesystems[1085]: Found vda7 Feb 12 19:47:57.924098 extend-filesystems[1085]: Found vda9 Feb 12 19:47:57.924098 extend-filesystems[1085]: Checking size of /dev/vda9 Feb 12 19:47:57.965005 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Feb 12 19:47:57.917384 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:47:57.965102 extend-filesystems[1085]: Resized partition /dev/vda9 Feb 12 19:47:57.926400 dbus-daemon[1083]: [system] SELinux support is enabled Feb 12 19:47:57.919445 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:47:57.966250 jq[1103]: true Feb 12 19:47:57.966524 extend-filesystems[1127]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:47:57.919580 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:47:57.919791 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:47:57.967649 tar[1107]: ./ Feb 12 19:47:57.967649 tar[1107]: ./loopback Feb 12 19:47:57.919903 systemd[1]: Finished motdgen.service. Feb 12 19:47:57.967875 jq[1110]: true Feb 12 19:47:57.922204 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:47:57.922382 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:47:57.968117 tar[1108]: crictl Feb 12 19:47:57.926503 systemd[1]: Started dbus.service. Feb 12 19:47:57.928598 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:47:57.928613 systemd[1]: Reached target system-config.target. Feb 12 19:47:57.929257 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:47:57.929278 systemd[1]: Reached target user-config.target. Feb 12 19:47:57.975592 update_engine[1101]: I0212 19:47:57.975294 1101 main.cc:92] Flatcar Update Engine starting Feb 12 19:47:57.977372 tar[1107]: ./bandwidth Feb 12 19:47:57.977504 systemd[1]: Started update-engine.service. Feb 12 19:47:57.977663 update_engine[1101]: I0212 19:47:57.977530 1101 update_check_scheduler.cc:74] Next update check in 7m22s Feb 12 19:47:57.977710 systemd-logind[1099]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 19:47:57.977918 systemd-logind[1099]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:47:57.978948 systemd-logind[1099]: New seat seat0. Feb 12 19:47:57.984735 env[1111]: time="2024-02-12T19:47:57.984683654Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:47:57.984878 systemd[1]: Started locksmithd.service. Feb 12 19:47:57.988706 systemd[1]: Started systemd-logind.service. Feb 12 19:47:57.993294 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Feb 12 19:47:58.008778 env[1111]: time="2024-02-12T19:47:58.003384058Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:47:58.012484 extend-filesystems[1127]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:47:58.012484 extend-filesystems[1127]: old_desc_blocks = 1, new_desc_blocks = 1 Feb 12 19:47:58.012484 extend-filesystems[1127]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Feb 12 19:47:58.011938 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:47:58.015930 extend-filesystems[1085]: Resized filesystem in /dev/vda9 Feb 12 19:47:58.012069 systemd[1]: Finished extend-filesystems.service. Feb 12 19:47:58.018593 bash[1138]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:47:58.019182 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:47:58.027500 env[1111]: time="2024-02-12T19:47:58.027431396Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:58.028729 env[1111]: time="2024-02-12T19:47:58.028692501Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:58.028729 env[1111]: time="2024-02-12T19:47:58.028724561Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:58.028923 env[1111]: time="2024-02-12T19:47:58.028895973Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:58.028923 env[1111]: time="2024-02-12T19:47:58.028917513Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:58.028989 env[1111]: time="2024-02-12T19:47:58.028929475Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:47:58.028989 env[1111]: time="2024-02-12T19:47:58.028939184Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:58.029024 env[1111]: time="2024-02-12T19:47:58.028997944Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:58.029232 env[1111]: time="2024-02-12T19:47:58.029208408Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:58.029374 env[1111]: time="2024-02-12T19:47:58.029347730Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:58.029421 env[1111]: time="2024-02-12T19:47:58.029367978Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:47:58.029444 env[1111]: time="2024-02-12T19:47:58.029418713Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:47:58.029444 env[1111]: time="2024-02-12T19:47:58.029430124Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:47:58.033636 env[1111]: time="2024-02-12T19:47:58.033610342Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:47:58.033677 env[1111]: time="2024-02-12T19:47:58.033640679Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:47:58.033677 env[1111]: time="2024-02-12T19:47:58.033658222Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:47:58.033713 env[1111]: time="2024-02-12T19:47:58.033689150Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.033713 env[1111]: time="2024-02-12T19:47:58.033703957Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.033748 env[1111]: time="2024-02-12T19:47:58.033717733Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.033748 env[1111]: time="2024-02-12T19:47:58.033729936Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.033748 env[1111]: time="2024-02-12T19:47:58.033742440Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.033805 env[1111]: time="2024-02-12T19:47:58.033755544Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.033805 env[1111]: time="2024-02-12T19:47:58.033770252Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.033805 env[1111]: time="2024-02-12T19:47:58.033782314Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.033805 env[1111]: time="2024-02-12T19:47:58.033796521Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:47:58.033882 env[1111]: time="2024-02-12T19:47:58.033867715Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:47:58.033954 env[1111]: time="2024-02-12T19:47:58.033931053Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:47:58.034182 env[1111]: time="2024-02-12T19:47:58.034151677Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:47:58.034222 env[1111]: time="2024-02-12T19:47:58.034185150Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034222 env[1111]: time="2024-02-12T19:47:58.034207121Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:47:58.034264 env[1111]: time="2024-02-12T19:47:58.034246104Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034264 env[1111]: time="2024-02-12T19:47:58.034259539Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034399 env[1111]: time="2024-02-12T19:47:58.034322006Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034399 env[1111]: time="2024-02-12T19:47:58.034340331Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034399 env[1111]: time="2024-02-12T19:47:58.034351822Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034399 env[1111]: time="2024-02-12T19:47:58.034391296Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034492 env[1111]: time="2024-02-12T19:47:58.034406174Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034492 env[1111]: time="2024-02-12T19:47:58.034417956Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034492 env[1111]: time="2024-02-12T19:47:58.034438555Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:47:58.034551 env[1111]: time="2024-02-12T19:47:58.034543121Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034571 env[1111]: time="2024-02-12T19:47:58.034557528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034593 env[1111]: time="2024-02-12T19:47:58.034570643Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034593 env[1111]: time="2024-02-12T19:47:58.034581844Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:47:58.034629 env[1111]: time="2024-02-12T19:47:58.034594287Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:47:58.034629 env[1111]: time="2024-02-12T19:47:58.034605277Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:47:58.034629 env[1111]: time="2024-02-12T19:47:58.034623261Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:47:58.034682 env[1111]: time="2024-02-12T19:47:58.034654830Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:47:58.034880 env[1111]: time="2024-02-12T19:47:58.034826081Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:47:58.034880 env[1111]: time="2024-02-12T19:47:58.034879492Z" level=info msg="Connect containerd service" Feb 12 19:47:58.035621 env[1111]: time="2024-02-12T19:47:58.034906512Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:47:58.035621 env[1111]: time="2024-02-12T19:47:58.035387214Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:47:58.035664 env[1111]: time="2024-02-12T19:47:58.035622224Z" level=info msg="Start subscribing containerd event" Feb 12 19:47:58.035686 env[1111]: time="2024-02-12T19:47:58.035669222Z" level=info msg="Start recovering state" Feb 12 19:47:58.035729 env[1111]: time="2024-02-12T19:47:58.035713425Z" level=info msg="Start event monitor" Feb 12 19:47:58.035754 env[1111]: time="2024-02-12T19:47:58.035733443Z" level=info msg="Start snapshots syncer" Feb 12 19:47:58.035754 env[1111]: time="2024-02-12T19:47:58.035742129Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:47:58.035754 env[1111]: time="2024-02-12T19:47:58.035749884Z" level=info msg="Start streaming server" Feb 12 19:47:58.035966 env[1111]: time="2024-02-12T19:47:58.035942094Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:47:58.036005 env[1111]: time="2024-02-12T19:47:58.035989453Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:47:58.036084 env[1111]: time="2024-02-12T19:47:58.036027775Z" level=info msg="containerd successfully booted in 0.052094s" Feb 12 19:47:58.036085 systemd[1]: Started containerd.service. Feb 12 19:47:58.038449 tar[1107]: ./ptp Feb 12 19:47:58.048104 locksmithd[1139]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:47:58.072764 tar[1107]: ./vlan Feb 12 19:47:58.105459 tar[1107]: ./host-device Feb 12 19:47:58.137129 tar[1107]: ./tuning Feb 12 19:47:58.165532 tar[1107]: ./vrf Feb 12 19:47:58.195093 tar[1107]: ./sbr Feb 12 19:47:58.223863 tar[1107]: ./tap Feb 12 19:47:58.256754 tar[1107]: ./dhcp Feb 12 19:47:58.339546 tar[1107]: ./static Feb 12 19:47:58.362781 tar[1107]: ./firewall Feb 12 19:47:58.363290 systemd[1]: Finished prepare-critools.service. Feb 12 19:47:58.395452 tar[1107]: ./macvlan Feb 12 19:47:58.424527 tar[1107]: ./dummy Feb 12 19:47:58.453816 tar[1107]: ./bridge Feb 12 19:47:58.486092 tar[1107]: ./ipvlan Feb 12 19:47:58.515411 tar[1107]: ./portmap Feb 12 19:47:58.541114 sshd_keygen[1104]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:47:58.543352 tar[1107]: ./host-local Feb 12 19:47:58.558370 systemd[1]: Finished sshd-keygen.service. Feb 12 19:47:58.560367 systemd[1]: Starting issuegen.service... Feb 12 19:47:58.565217 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:47:58.565384 systemd[1]: Finished issuegen.service. Feb 12 19:47:58.567325 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:47:58.572032 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:47:58.573770 systemd[1]: Started getty@tty1.service. Feb 12 19:47:58.575229 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:47:58.575985 systemd[1]: Reached target getty.target. Feb 12 19:47:58.576906 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:47:58.577750 systemd[1]: Reached target multi-user.target. Feb 12 19:47:58.579208 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:47:58.580342 systemd-networkd[1011]: eth0: Gained IPv6LL Feb 12 19:47:58.585114 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:47:58.585237 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:47:58.586035 systemd[1]: Startup finished in 498ms (kernel) + 5.092s (initrd) + 4.532s (userspace) = 10.123s. Feb 12 19:48:07.530181 systemd[1]: Created slice system-sshd.slice. Feb 12 19:48:07.531072 systemd[1]: Started sshd@0-10.0.0.143:22-10.0.0.1:41082.service. Feb 12 19:48:07.571856 sshd[1168]: Accepted publickey for core from 10.0.0.1 port 41082 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:07.573015 sshd[1168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:07.580157 systemd-logind[1099]: New session 1 of user core. Feb 12 19:48:07.580889 systemd[1]: Created slice user-500.slice. Feb 12 19:48:07.581788 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:48:07.588397 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:48:07.589418 systemd[1]: Starting user@500.service... Feb 12 19:48:07.591428 (systemd)[1171]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:07.652378 systemd[1171]: Queued start job for default target default.target. Feb 12 19:48:07.652730 systemd[1171]: Reached target paths.target. Feb 12 19:48:07.652749 systemd[1171]: Reached target sockets.target. Feb 12 19:48:07.652761 systemd[1171]: Reached target timers.target. Feb 12 19:48:07.652771 systemd[1171]: Reached target basic.target. Feb 12 19:48:07.652803 systemd[1171]: Reached target default.target. Feb 12 19:48:07.652823 systemd[1171]: Startup finished in 57ms. Feb 12 19:48:07.652888 systemd[1]: Started user@500.service. Feb 12 19:48:07.653829 systemd[1]: Started session-1.scope. Feb 12 19:48:07.703415 systemd[1]: Started sshd@1-10.0.0.143:22-10.0.0.1:41094.service. Feb 12 19:48:07.743027 sshd[1180]: Accepted publickey for core from 10.0.0.1 port 41094 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:07.744068 sshd[1180]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:07.747250 systemd-logind[1099]: New session 2 of user core. Feb 12 19:48:07.747978 systemd[1]: Started session-2.scope. Feb 12 19:48:07.799993 sshd[1180]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:07.802253 systemd[1]: sshd@1-10.0.0.143:22-10.0.0.1:41094.service: Deactivated successfully. Feb 12 19:48:07.802731 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:48:07.803207 systemd-logind[1099]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:48:07.804130 systemd[1]: Started sshd@2-10.0.0.143:22-10.0.0.1:41106.service. Feb 12 19:48:07.804695 systemd-logind[1099]: Removed session 2. Feb 12 19:48:07.842669 sshd[1186]: Accepted publickey for core from 10.0.0.1 port 41106 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:07.843562 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:07.846245 systemd-logind[1099]: New session 3 of user core. Feb 12 19:48:07.846929 systemd[1]: Started session-3.scope. Feb 12 19:48:07.895298 sshd[1186]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:07.897790 systemd[1]: sshd@2-10.0.0.143:22-10.0.0.1:41106.service: Deactivated successfully. Feb 12 19:48:07.898266 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:48:07.898748 systemd-logind[1099]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:48:07.899641 systemd[1]: Started sshd@3-10.0.0.143:22-10.0.0.1:41110.service. Feb 12 19:48:07.900213 systemd-logind[1099]: Removed session 3. Feb 12 19:48:07.937806 sshd[1193]: Accepted publickey for core from 10.0.0.1 port 41110 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:07.938798 sshd[1193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:07.941533 systemd-logind[1099]: New session 4 of user core. Feb 12 19:48:07.942196 systemd[1]: Started session-4.scope. Feb 12 19:48:07.993825 sshd[1193]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:07.996199 systemd[1]: sshd@3-10.0.0.143:22-10.0.0.1:41110.service: Deactivated successfully. Feb 12 19:48:07.996691 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:48:07.997166 systemd-logind[1099]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:48:07.998075 systemd[1]: Started sshd@4-10.0.0.143:22-10.0.0.1:41112.service. Feb 12 19:48:07.998642 systemd-logind[1099]: Removed session 4. Feb 12 19:48:08.036175 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 41112 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:08.037081 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:08.039739 systemd-logind[1099]: New session 5 of user core. Feb 12 19:48:08.040417 systemd[1]: Started session-5.scope. Feb 12 19:48:08.093007 sudo[1202]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:48:08.093173 sudo[1202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:48:08.099468 dbus-daemon[1083]: \xd0\u000d\xb5\x8b\u0010V: received setenforce notice (enforcing=-1648169344) Feb 12 19:48:08.101499 sudo[1202]: pam_unix(sudo:session): session closed for user root Feb 12 19:48:08.103045 sshd[1199]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:08.105372 systemd[1]: sshd@4-10.0.0.143:22-10.0.0.1:41112.service: Deactivated successfully. Feb 12 19:48:08.105841 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:48:08.106291 systemd-logind[1099]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:48:08.107113 systemd[1]: Started sshd@5-10.0.0.143:22-10.0.0.1:41120.service. Feb 12 19:48:08.107734 systemd-logind[1099]: Removed session 5. Feb 12 19:48:08.145364 sshd[1206]: Accepted publickey for core from 10.0.0.1 port 41120 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:08.146319 sshd[1206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:08.149073 systemd-logind[1099]: New session 6 of user core. Feb 12 19:48:08.149692 systemd[1]: Started session-6.scope. Feb 12 19:48:08.200765 sudo[1210]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:48:08.200935 sudo[1210]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:48:08.203071 sudo[1210]: pam_unix(sudo:session): session closed for user root Feb 12 19:48:08.207105 sudo[1209]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:48:08.207281 sudo[1209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:48:08.214749 systemd[1]: Stopping audit-rules.service... Feb 12 19:48:08.214000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:48:08.216002 auditctl[1213]: No rules Feb 12 19:48:08.216329 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:48:08.216430 kernel: kauditd_printk_skb: 249 callbacks suppressed Feb 12 19:48:08.216458 kernel: audit: type=1305 audit(1707767288.214:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:48:08.216499 systemd[1]: Stopped audit-rules.service. Feb 12 19:48:08.214000 audit[1213]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7b244b30 a2=420 a3=0 items=0 ppid=1 pid=1213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:08.217830 systemd[1]: Starting audit-rules.service... Feb 12 19:48:08.220643 kernel: audit: type=1300 audit(1707767288.214:170): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7b244b30 a2=420 a3=0 items=0 ppid=1 pid=1213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:08.220683 kernel: audit: type=1327 audit(1707767288.214:170): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:48:08.214000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:48:08.222871 kernel: audit: type=1131 audit(1707767288.215:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.232213 augenrules[1230]: No rules Feb 12 19:48:08.232744 systemd[1]: Finished audit-rules.service. Feb 12 19:48:08.237545 kernel: audit: type=1130 audit(1707767288.231:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.237587 kernel: audit: type=1106 audit(1707767288.232:173): pid=1209 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.232000 audit[1209]: USER_END pid=1209 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.233488 sudo[1209]: pam_unix(sudo:session): session closed for user root Feb 12 19:48:08.236431 systemd[1]: sshd@5-10.0.0.143:22-10.0.0.1:41120.service: Deactivated successfully. Feb 12 19:48:08.234427 sshd[1206]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:08.236896 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:48:08.237621 systemd-logind[1099]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:48:08.232000 audit[1209]: CRED_DISP pid=1209 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.238734 systemd[1]: Started sshd@6-10.0.0.143:22-10.0.0.1:41136.service. Feb 12 19:48:08.239425 systemd-logind[1099]: Removed session 6. Feb 12 19:48:08.240170 kernel: audit: type=1104 audit(1707767288.232:174): pid=1209 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.240219 kernel: audit: type=1106 audit(1707767288.233:175): pid=1206 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:08.233000 audit[1206]: USER_END pid=1206 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:08.233000 audit[1206]: CRED_DISP pid=1206 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:08.245454 kernel: audit: type=1104 audit(1707767288.233:176): pid=1206 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:08.245479 kernel: audit: type=1131 audit(1707767288.235:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.143:22-10.0.0.1:41120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.143:22-10.0.0.1:41120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:41136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.277000 audit[1236]: USER_ACCT pid=1236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:08.278679 sshd[1236]: Accepted publickey for core from 10.0.0.1 port 41136 ssh2: RSA SHA256:61J5tVZgtMsvFgBzlA318rHvk/8vx1tAF2anfHXiCnk Feb 12 19:48:08.278000 audit[1236]: CRED_ACQ pid=1236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:08.278000 audit[1236]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc918ba00 a2=3 a3=0 items=0 ppid=1 pid=1236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:08.278000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:08.279551 sshd[1236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:08.282415 systemd-logind[1099]: New session 7 of user core. Feb 12 19:48:08.283054 systemd[1]: Started session-7.scope. Feb 12 19:48:08.284000 audit[1236]: USER_START pid=1236 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:08.286000 audit[1238]: CRED_ACQ pid=1238 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:08.331000 audit[1239]: USER_ACCT pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.333351 sudo[1239]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:48:08.332000 audit[1239]: CRED_REFR pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:08.333518 sudo[1239]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:48:08.333000 audit[1239]: USER_START pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:09.140957 systemd[1]: Reloading. Feb 12 19:48:09.195538 /usr/lib/systemd/system-generators/torcx-generator[1269]: time="2024-02-12T19:48:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:48:09.195563 /usr/lib/systemd/system-generators/torcx-generator[1269]: time="2024-02-12T19:48:09Z" level=info msg="torcx already run" Feb 12 19:48:09.257636 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:48:09.257653 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:48:09.276107 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.325000 audit: BPF prog-id=37 op=LOAD Feb 12 19:48:09.325000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit: BPF prog-id=38 op=LOAD Feb 12 19:48:09.326000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit: BPF prog-id=39 op=LOAD Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.326000 audit: BPF prog-id=40 op=LOAD Feb 12 19:48:09.326000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:48:09.326000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit: BPF prog-id=41 op=LOAD Feb 12 19:48:09.327000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit: BPF prog-id=42 op=LOAD Feb 12 19:48:09.327000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit: BPF prog-id=43 op=LOAD Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.327000 audit: BPF prog-id=44 op=LOAD Feb 12 19:48:09.327000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:48:09.327000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.329000 audit: BPF prog-id=45 op=LOAD Feb 12 19:48:09.329000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit: BPF prog-id=46 op=LOAD Feb 12 19:48:09.330000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit: BPF prog-id=47 op=LOAD Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.330000 audit: BPF prog-id=48 op=LOAD Feb 12 19:48:09.330000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:48:09.330000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.332000 audit: BPF prog-id=49 op=LOAD Feb 12 19:48:09.332000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit: BPF prog-id=50 op=LOAD Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.333000 audit: BPF prog-id=51 op=LOAD Feb 12 19:48:09.333000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:48:09.333000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:48:09.340776 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:48:09.344951 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:48:09.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:09.345342 systemd[1]: Reached target network-online.target. Feb 12 19:48:09.346422 systemd[1]: Started kubelet.service. Feb 12 19:48:09.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:09.354751 systemd[1]: Starting coreos-metadata.service... Feb 12 19:48:09.360826 systemd[1]: coreos-metadata.service: Deactivated successfully. Feb 12 19:48:09.360949 systemd[1]: Finished coreos-metadata.service. Feb 12 19:48:09.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:09.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:09.397482 kubelet[1309]: E0212 19:48:09.397352 1309 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:48:09.399541 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:48:09.399658 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:48:09.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:48:09.575852 systemd[1]: Stopped kubelet.service. Feb 12 19:48:09.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:09.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:09.586908 systemd[1]: Reloading. Feb 12 19:48:09.640776 /usr/lib/systemd/system-generators/torcx-generator[1378]: time="2024-02-12T19:48:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:48:09.640803 /usr/lib/systemd/system-generators/torcx-generator[1378]: time="2024-02-12T19:48:09Z" level=info msg="torcx already run" Feb 12 19:48:09.699746 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:48:09.699761 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:48:09.718167 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit: BPF prog-id=52 op=LOAD Feb 12 19:48:09.767000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit: BPF prog-id=53 op=LOAD Feb 12 19:48:09.767000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit: BPF prog-id=54 op=LOAD Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit: BPF prog-id=55 op=LOAD Feb 12 19:48:09.768000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:48:09.768000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.768000 audit: BPF prog-id=56 op=LOAD Feb 12 19:48:09.768000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit: BPF prog-id=57 op=LOAD Feb 12 19:48:09.769000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit: BPF prog-id=58 op=LOAD Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.769000 audit: BPF prog-id=59 op=LOAD Feb 12 19:48:09.769000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:48:09.769000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit: BPF prog-id=60 op=LOAD Feb 12 19:48:09.771000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit: BPF prog-id=61 op=LOAD Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit: BPF prog-id=62 op=LOAD Feb 12 19:48:09.772000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:48:09.772000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.772000 audit: BPF prog-id=63 op=LOAD Feb 12 19:48:09.772000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.774000 audit: BPF prog-id=64 op=LOAD Feb 12 19:48:09.774000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit: BPF prog-id=65 op=LOAD Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:09.775000 audit: BPF prog-id=66 op=LOAD Feb 12 19:48:09.775000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:48:09.775000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:48:09.785516 systemd[1]: Started kubelet.service. Feb 12 19:48:09.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:09.824616 kubelet[1419]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:48:09.824616 kubelet[1419]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:48:09.824616 kubelet[1419]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:48:09.824985 kubelet[1419]: I0212 19:48:09.824679 1419 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:48:10.120327 kubelet[1419]: I0212 19:48:10.120234 1419 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:48:10.120327 kubelet[1419]: I0212 19:48:10.120278 1419 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:48:10.120525 kubelet[1419]: I0212 19:48:10.120492 1419 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:48:10.122831 kubelet[1419]: I0212 19:48:10.122796 1419 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:48:10.129923 kubelet[1419]: I0212 19:48:10.129898 1419 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:48:10.130094 kubelet[1419]: I0212 19:48:10.130074 1419 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:48:10.130234 kubelet[1419]: I0212 19:48:10.130216 1419 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:48:10.130326 kubelet[1419]: I0212 19:48:10.130237 1419 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:48:10.130326 kubelet[1419]: I0212 19:48:10.130245 1419 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:48:10.130406 kubelet[1419]: I0212 19:48:10.130347 1419 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:48:10.130430 kubelet[1419]: I0212 19:48:10.130413 1419 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:48:10.130430 kubelet[1419]: I0212 19:48:10.130426 1419 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:48:10.130467 kubelet[1419]: I0212 19:48:10.130447 1419 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:48:10.130467 kubelet[1419]: I0212 19:48:10.130461 1419 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:48:10.130833 kubelet[1419]: E0212 19:48:10.130797 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:10.130833 kubelet[1419]: E0212 19:48:10.130822 1419 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:10.131028 kubelet[1419]: I0212 19:48:10.130995 1419 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:48:10.131211 kubelet[1419]: W0212 19:48:10.131186 1419 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:48:10.131613 kubelet[1419]: I0212 19:48:10.131595 1419 server.go:1232] "Started kubelet" Feb 12 19:48:10.131661 kubelet[1419]: I0212 19:48:10.131652 1419 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:48:10.131874 kubelet[1419]: I0212 19:48:10.131850 1419 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:48:10.132083 kubelet[1419]: I0212 19:48:10.132069 1419 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:48:10.132262 kubelet[1419]: I0212 19:48:10.132248 1419 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:48:10.132486 kubelet[1419]: E0212 19:48:10.132468 1419 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:48:10.132486 kubelet[1419]: E0212 19:48:10.132487 1419 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:48:10.131000 audit[1419]: AVC avc: denied { mac_admin } for pid=1419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:10.131000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:48:10.131000 audit[1419]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00058b1a0 a1=c00075af48 a2=c00058b170 a3=25 items=0 ppid=1 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.131000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:48:10.131000 audit[1419]: AVC avc: denied { mac_admin } for pid=1419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:10.131000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:48:10.131000 audit[1419]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009a8dc0 a1=c00075af60 a2=c00058b230 a3=25 items=0 ppid=1 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.131000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:48:10.133384 kubelet[1419]: I0212 19:48:10.133113 1419 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:48:10.133384 kubelet[1419]: I0212 19:48:10.133145 1419 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:48:10.133384 kubelet[1419]: I0212 19:48:10.133198 1419 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:48:10.133563 kubelet[1419]: I0212 19:48:10.133535 1419 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:48:10.133615 kubelet[1419]: I0212 19:48:10.133612 1419 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:48:10.133669 kubelet[1419]: I0212 19:48:10.133655 1419 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:48:10.139538 kubelet[1419]: W0212 19:48:10.139145 1419 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:48:10.139538 kubelet[1419]: E0212 19:48:10.139457 1419 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:48:10.139538 kubelet[1419]: E0212 19:48:10.139508 1419 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.143\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 19:48:10.139538 kubelet[1419]: W0212 19:48:10.139540 1419 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:48:10.139657 kubelet[1419]: E0212 19:48:10.139552 1419 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:48:10.139657 kubelet[1419]: W0212 19:48:10.139584 1419 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.0.0.143" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:48:10.139657 kubelet[1419]: E0212 19:48:10.139592 1419 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.143" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:48:10.139720 kubelet[1419]: E0212 19:48:10.139631 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d5f52fc84", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 131577988, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 131577988, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.141996 kubelet[1419]: E0212 19:48:10.141937 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d5f60c277", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 132480631, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 132480631, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.153873 kubelet[1419]: I0212 19:48:10.153845 1419 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:48:10.153873 kubelet[1419]: I0212 19:48:10.153868 1419 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:48:10.153935 kubelet[1419]: I0212 19:48:10.153882 1419 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:48:10.154432 kubelet[1419]: E0212 19:48:10.154365 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e17c8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.143 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153277384, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153277384, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.155009 kubelet[1419]: E0212 19:48:10.154964 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e3388", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.143 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153284488, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153284488, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.155528 kubelet[1419]: E0212 19:48:10.155485 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e43da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.143 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153288666, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153288666, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.155000 audit[1433]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:10.155000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd008ead70 a2=0 a3=7ffd008ead5c items=0 ppid=1419 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:48:10.156488 kubelet[1419]: I0212 19:48:10.156434 1419 policy_none.go:49] "None policy: Start" Feb 12 19:48:10.156983 kubelet[1419]: I0212 19:48:10.156969 1419 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:48:10.156983 kubelet[1419]: I0212 19:48:10.156986 1419 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:48:10.156000 audit[1436]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:10.156000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffa92c5950 a2=0 a3=7fffa92c593c items=0 ppid=1419 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:48:10.160995 systemd[1]: Created slice kubepods.slice. Feb 12 19:48:10.164631 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:48:10.166835 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:48:10.172868 kubelet[1419]: I0212 19:48:10.172845 1419 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:48:10.171000 audit[1419]: AVC avc: denied { mac_admin } for pid=1419 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:10.171000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:48:10.171000 audit[1419]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000792c60 a1=c000c36690 a2=c000792c30 a3=25 items=0 ppid=1 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.171000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:48:10.173193 kubelet[1419]: I0212 19:48:10.173150 1419 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:48:10.173399 kubelet[1419]: I0212 19:48:10.173387 1419 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:48:10.174484 kubelet[1419]: E0212 19:48:10.174462 1419 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.143\" not found" Feb 12 19:48:10.175178 kubelet[1419]: E0212 19:48:10.175131 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d61e0e852", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 174433362, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 174433362, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.157000 audit[1438]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:10.157000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2def0cc0 a2=0 a3=7ffe2def0cac items=0 ppid=1419 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:48:10.175000 audit[1445]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:10.175000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff30fc9240 a2=0 a3=7fff30fc922c items=0 ppid=1419 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:48:10.204000 audit[1450]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:10.204000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeb775c780 a2=0 a3=7ffeb775c76c items=0 ppid=1419 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:48:10.205604 kubelet[1419]: I0212 19:48:10.205540 1419 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:48:10.204000 audit[1451]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:10.204000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd55ab23d0 a2=0 a3=7ffd55ab23bc items=0 ppid=1419 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:48:10.206314 kubelet[1419]: I0212 19:48:10.206301 1419 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:48:10.206345 kubelet[1419]: I0212 19:48:10.206322 1419 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:48:10.206345 kubelet[1419]: I0212 19:48:10.206340 1419 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:48:10.206386 kubelet[1419]: E0212 19:48:10.206378 1419 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:48:10.205000 audit[1452]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:10.205000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff02551f30 a2=0 a3=7fff02551f1c items=0 ppid=1419 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:48:10.205000 audit[1453]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:10.205000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce3056060 a2=0 a3=7ffce305604c items=0 ppid=1419 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.205000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:48:10.207376 kubelet[1419]: W0212 19:48:10.207354 1419 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:48:10.207376 kubelet[1419]: E0212 19:48:10.207377 1419 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:48:10.206000 audit[1454]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:10.206000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc1edf4390 a2=0 a3=7ffc1edf437c items=0 ppid=1419 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:48:10.206000 audit[1455]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:10.206000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffda835e630 a2=0 a3=7ffda835e61c items=0 ppid=1419 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:48:10.207000 audit[1456]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:10.207000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe96b53970 a2=0 a3=7ffe96b5395c items=0 ppid=1419 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:48:10.207000 audit[1457]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:10.207000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffded4b5280 a2=0 a3=7ffded4b526c items=0 ppid=1419 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:10.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:48:10.234443 kubelet[1419]: I0212 19:48:10.234424 1419 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.143" Feb 12 19:48:10.235130 kubelet[1419]: E0212 19:48:10.235113 1419 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.143" Feb 12 19:48:10.235503 kubelet[1419]: E0212 19:48:10.235429 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e17c8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.143 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153277384, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 234397404, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e17c8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.236185 kubelet[1419]: E0212 19:48:10.236132 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e3388", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.143 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153284488, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 234404818, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e3388" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.236798 kubelet[1419]: E0212 19:48:10.236752 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e43da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.143 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153288666, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 234406872, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e43da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.341054 kubelet[1419]: E0212 19:48:10.341031 1419 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.143\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 19:48:10.435743 kubelet[1419]: I0212 19:48:10.435728 1419 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.143" Feb 12 19:48:10.436387 kubelet[1419]: E0212 19:48:10.436368 1419 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.143" Feb 12 19:48:10.436565 kubelet[1419]: E0212 19:48:10.436500 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e17c8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.143 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153277384, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 435692673, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e17c8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.437241 kubelet[1419]: E0212 19:48:10.437179 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e3388", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.143 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153284488, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 435700868, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e3388" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.437896 kubelet[1419]: E0212 19:48:10.437845 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e43da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.143 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153288666, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 435702962, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e43da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.742861 kubelet[1419]: E0212 19:48:10.742780 1419 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.143\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 19:48:10.837737 kubelet[1419]: I0212 19:48:10.837717 1419 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.143" Feb 12 19:48:10.838755 kubelet[1419]: E0212 19:48:10.838725 1419 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.0.0.143" Feb 12 19:48:10.838891 kubelet[1419]: E0212 19:48:10.838734 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e17c8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.0.0.143 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153277384, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 837673317, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e17c8" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.839521 kubelet[1419]: E0212 19:48:10.839445 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e3388", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.0.0.143 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153284488, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 837682163, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e3388" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:10.840317 kubelet[1419]: E0212 19:48:10.840252 1419 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143.17b3354d609e43da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.0.0.143", UID:"10.0.0.143", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.0.0.143 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.0.0.143"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 153288666, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 10, 837688205, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.0.0.143"}': 'events "10.0.0.143.17b3354d609e43da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:11.004484 kubelet[1419]: W0212 19:48:11.004432 1419 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:48:11.004484 kubelet[1419]: E0212 19:48:11.004456 1419 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:48:11.121894 kubelet[1419]: I0212 19:48:11.121855 1419 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 19:48:11.131177 kubelet[1419]: E0212 19:48:11.131128 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:11.512025 kubelet[1419]: E0212 19:48:11.511995 1419 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.143" not found Feb 12 19:48:11.545596 kubelet[1419]: E0212 19:48:11.545570 1419 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.143\" not found" node="10.0.0.143" Feb 12 19:48:11.640049 kubelet[1419]: I0212 19:48:11.640018 1419 kubelet_node_status.go:70] "Attempting to register node" node="10.0.0.143" Feb 12 19:48:11.642442 kubelet[1419]: I0212 19:48:11.642412 1419 kubelet_node_status.go:73] "Successfully registered node" node="10.0.0.143" Feb 12 19:48:11.654017 kubelet[1419]: I0212 19:48:11.653990 1419 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 19:48:11.654367 env[1111]: time="2024-02-12T19:48:11.654329767Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:48:11.654611 kubelet[1419]: I0212 19:48:11.654543 1419 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 19:48:11.795000 audit[1239]: USER_END pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:11.795000 audit[1239]: CRED_DISP pid=1239 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:11.797134 sudo[1239]: pam_unix(sudo:session): session closed for user root Feb 12 19:48:11.798251 sshd[1236]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:11.797000 audit[1236]: USER_END pid=1236 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.797000 audit[1236]: CRED_DISP pid=1236 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Feb 12 19:48:11.800597 systemd[1]: sshd@6-10.0.0.143:22-10.0.0.1:41136.service: Deactivated successfully. Feb 12 19:48:11.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:41136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:11.801220 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:48:11.801874 systemd-logind[1099]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:48:11.802515 systemd-logind[1099]: Removed session 7. Feb 12 19:48:12.132294 kubelet[1419]: I0212 19:48:12.132160 1419 apiserver.go:52] "Watching apiserver" Feb 12 19:48:12.132294 kubelet[1419]: E0212 19:48:12.132169 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:12.134518 kubelet[1419]: I0212 19:48:12.134468 1419 topology_manager.go:215] "Topology Admit Handler" podUID="38d2e949-a180-4c61-9e4a-aae1737f5bdb" podNamespace="calico-system" podName="calico-node-4cc6n" Feb 12 19:48:12.134570 kubelet[1419]: I0212 19:48:12.134534 1419 topology_manager.go:215] "Topology Admit Handler" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" podNamespace="calico-system" podName="csi-node-driver-sjfgx" Feb 12 19:48:12.134594 kubelet[1419]: I0212 19:48:12.134582 1419 topology_manager.go:215] "Topology Admit Handler" podUID="03a8f03e-d0f7-42d1-8295-263c60930a8d" podNamespace="kube-system" podName="kube-proxy-r5qlv" Feb 12 19:48:12.134745 kubelet[1419]: E0212 19:48:12.134712 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:12.139650 systemd[1]: Created slice kubepods-besteffort-pod03a8f03e_d0f7_42d1_8295_263c60930a8d.slice. Feb 12 19:48:12.148117 systemd[1]: Created slice kubepods-besteffort-pod38d2e949_a180_4c61_9e4a_aae1737f5bdb.slice. Feb 12 19:48:12.234344 kubelet[1419]: I0212 19:48:12.234319 1419 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:48:12.242240 kubelet[1419]: I0212 19:48:12.242217 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-cni-bin-dir\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242295 kubelet[1419]: I0212 19:48:12.242246 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-29mgc\" (UniqueName: \"kubernetes.io/projected/bb7e11a9-b9b7-4de6-980f-5bf9f9111203-kube-api-access-29mgc\") pod \"csi-node-driver-sjfgx\" (UID: \"bb7e11a9-b9b7-4de6-980f-5bf9f9111203\") " pod="calico-system/csi-node-driver-sjfgx" Feb 12 19:48:12.242295 kubelet[1419]: I0212 19:48:12.242265 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mgbks\" (UniqueName: \"kubernetes.io/projected/03a8f03e-d0f7-42d1-8295-263c60930a8d-kube-api-access-mgbks\") pod \"kube-proxy-r5qlv\" (UID: \"03a8f03e-d0f7-42d1-8295-263c60930a8d\") " pod="kube-system/kube-proxy-r5qlv" Feb 12 19:48:12.242346 kubelet[1419]: I0212 19:48:12.242315 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-lib-modules\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242368 kubelet[1419]: I0212 19:48:12.242347 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-policysync\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242368 kubelet[1419]: I0212 19:48:12.242366 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-var-run-calico\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242408 kubelet[1419]: I0212 19:48:12.242381 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-var-lib-calico\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242429 kubelet[1419]: I0212 19:48:12.242408 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/bb7e11a9-b9b7-4de6-980f-5bf9f9111203-varrun\") pod \"csi-node-driver-sjfgx\" (UID: \"bb7e11a9-b9b7-4de6-980f-5bf9f9111203\") " pod="calico-system/csi-node-driver-sjfgx" Feb 12 19:48:12.242452 kubelet[1419]: I0212 19:48:12.242447 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/bb7e11a9-b9b7-4de6-980f-5bf9f9111203-kubelet-dir\") pod \"csi-node-driver-sjfgx\" (UID: \"bb7e11a9-b9b7-4de6-980f-5bf9f9111203\") " pod="calico-system/csi-node-driver-sjfgx" Feb 12 19:48:12.242486 kubelet[1419]: I0212 19:48:12.242475 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/bb7e11a9-b9b7-4de6-980f-5bf9f9111203-socket-dir\") pod \"csi-node-driver-sjfgx\" (UID: \"bb7e11a9-b9b7-4de6-980f-5bf9f9111203\") " pod="calico-system/csi-node-driver-sjfgx" Feb 12 19:48:12.242513 kubelet[1419]: I0212 19:48:12.242504 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/38d2e949-a180-4c61-9e4a-aae1737f5bdb-tigera-ca-bundle\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242560 kubelet[1419]: I0212 19:48:12.242541 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/03a8f03e-d0f7-42d1-8295-263c60930a8d-xtables-lock\") pod \"kube-proxy-r5qlv\" (UID: \"03a8f03e-d0f7-42d1-8295-263c60930a8d\") " pod="kube-system/kube-proxy-r5qlv" Feb 12 19:48:12.242649 kubelet[1419]: I0212 19:48:12.242628 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-xtables-lock\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242679 kubelet[1419]: I0212 19:48:12.242670 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/38d2e949-a180-4c61-9e4a-aae1737f5bdb-node-certs\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242714 kubelet[1419]: I0212 19:48:12.242706 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-cni-net-dir\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242736 kubelet[1419]: I0212 19:48:12.242728 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-cni-log-dir\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242760 kubelet[1419]: I0212 19:48:12.242754 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/38d2e949-a180-4c61-9e4a-aae1737f5bdb-flexvol-driver-host\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.242797 kubelet[1419]: I0212 19:48:12.242789 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/bb7e11a9-b9b7-4de6-980f-5bf9f9111203-registration-dir\") pod \"csi-node-driver-sjfgx\" (UID: \"bb7e11a9-b9b7-4de6-980f-5bf9f9111203\") " pod="calico-system/csi-node-driver-sjfgx" Feb 12 19:48:12.242853 kubelet[1419]: I0212 19:48:12.242841 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/03a8f03e-d0f7-42d1-8295-263c60930a8d-kube-proxy\") pod \"kube-proxy-r5qlv\" (UID: \"03a8f03e-d0f7-42d1-8295-263c60930a8d\") " pod="kube-system/kube-proxy-r5qlv" Feb 12 19:48:12.242884 kubelet[1419]: I0212 19:48:12.242869 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/03a8f03e-d0f7-42d1-8295-263c60930a8d-lib-modules\") pod \"kube-proxy-r5qlv\" (UID: \"03a8f03e-d0f7-42d1-8295-263c60930a8d\") " pod="kube-system/kube-proxy-r5qlv" Feb 12 19:48:12.242906 kubelet[1419]: I0212 19:48:12.242897 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qbr4s\" (UniqueName: \"kubernetes.io/projected/38d2e949-a180-4c61-9e4a-aae1737f5bdb-kube-api-access-qbr4s\") pod \"calico-node-4cc6n\" (UID: \"38d2e949-a180-4c61-9e4a-aae1737f5bdb\") " pod="calico-system/calico-node-4cc6n" Feb 12 19:48:12.344376 kubelet[1419]: E0212 19:48:12.344345 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.344376 kubelet[1419]: W0212 19:48:12.344364 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.344497 kubelet[1419]: E0212 19:48:12.344388 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.344612 kubelet[1419]: E0212 19:48:12.344596 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.344612 kubelet[1419]: W0212 19:48:12.344610 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.344696 kubelet[1419]: E0212 19:48:12.344633 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.344797 kubelet[1419]: E0212 19:48:12.344784 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.344797 kubelet[1419]: W0212 19:48:12.344795 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.344899 kubelet[1419]: E0212 19:48:12.344811 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.344986 kubelet[1419]: E0212 19:48:12.344972 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.344986 kubelet[1419]: W0212 19:48:12.344987 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.345061 kubelet[1419]: E0212 19:48:12.344999 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.345141 kubelet[1419]: E0212 19:48:12.345132 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.345196 kubelet[1419]: W0212 19:48:12.345145 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.345196 kubelet[1419]: E0212 19:48:12.345156 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.345329 kubelet[1419]: E0212 19:48:12.345316 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.345329 kubelet[1419]: W0212 19:48:12.345324 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.345417 kubelet[1419]: E0212 19:48:12.345335 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.345534 kubelet[1419]: E0212 19:48:12.345508 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.345592 kubelet[1419]: W0212 19:48:12.345518 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.345592 kubelet[1419]: E0212 19:48:12.345569 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.345719 kubelet[1419]: E0212 19:48:12.345705 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.345719 kubelet[1419]: W0212 19:48:12.345716 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.345796 kubelet[1419]: E0212 19:48:12.345748 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.345889 kubelet[1419]: E0212 19:48:12.345874 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.345889 kubelet[1419]: W0212 19:48:12.345885 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.345987 kubelet[1419]: E0212 19:48:12.345913 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.346062 kubelet[1419]: E0212 19:48:12.346047 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.346062 kubelet[1419]: W0212 19:48:12.346058 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.346156 kubelet[1419]: E0212 19:48:12.346118 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.346209 kubelet[1419]: E0212 19:48:12.346197 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.346209 kubelet[1419]: W0212 19:48:12.346205 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.346915 kubelet[1419]: E0212 19:48:12.346280 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.346915 kubelet[1419]: E0212 19:48:12.346369 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.346915 kubelet[1419]: W0212 19:48:12.346377 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.346915 kubelet[1419]: E0212 19:48:12.346392 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.346915 kubelet[1419]: E0212 19:48:12.346593 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.346915 kubelet[1419]: W0212 19:48:12.346599 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.346915 kubelet[1419]: E0212 19:48:12.346614 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.346915 kubelet[1419]: E0212 19:48:12.346753 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.346915 kubelet[1419]: W0212 19:48:12.346758 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.346915 kubelet[1419]: E0212 19:48:12.346770 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.347118 kubelet[1419]: E0212 19:48:12.346889 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.347118 kubelet[1419]: W0212 19:48:12.346895 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.347118 kubelet[1419]: E0212 19:48:12.346904 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.347118 kubelet[1419]: E0212 19:48:12.347023 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.347118 kubelet[1419]: W0212 19:48:12.347030 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.347118 kubelet[1419]: E0212 19:48:12.347074 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.347234 kubelet[1419]: E0212 19:48:12.347139 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.347234 kubelet[1419]: W0212 19:48:12.347144 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.347234 kubelet[1419]: E0212 19:48:12.347189 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.347319 kubelet[1419]: E0212 19:48:12.347257 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.347319 kubelet[1419]: W0212 19:48:12.347262 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.347319 kubelet[1419]: E0212 19:48:12.347289 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.347450 kubelet[1419]: E0212 19:48:12.347428 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.347450 kubelet[1419]: W0212 19:48:12.347442 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.347518 kubelet[1419]: E0212 19:48:12.347455 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.347639 kubelet[1419]: E0212 19:48:12.347619 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.347639 kubelet[1419]: W0212 19:48:12.347632 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.347639 kubelet[1419]: E0212 19:48:12.347640 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.347767 kubelet[1419]: E0212 19:48:12.347746 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.347767 kubelet[1419]: W0212 19:48:12.347759 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.347767 kubelet[1419]: E0212 19:48:12.347767 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.347902 kubelet[1419]: E0212 19:48:12.347882 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.347902 kubelet[1419]: W0212 19:48:12.347894 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.347902 kubelet[1419]: E0212 19:48:12.347903 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.348407 kubelet[1419]: E0212 19:48:12.348386 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.348407 kubelet[1419]: W0212 19:48:12.348403 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.348490 kubelet[1419]: E0212 19:48:12.348423 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.356364 kubelet[1419]: E0212 19:48:12.356348 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.356364 kubelet[1419]: W0212 19:48:12.356361 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.356440 kubelet[1419]: E0212 19:48:12.356386 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.356609 kubelet[1419]: E0212 19:48:12.356587 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.356609 kubelet[1419]: W0212 19:48:12.356597 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.356707 kubelet[1419]: E0212 19:48:12.356615 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.356780 kubelet[1419]: E0212 19:48:12.356770 1419 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:12.356780 kubelet[1419]: W0212 19:48:12.356779 1419 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:12.356860 kubelet[1419]: E0212 19:48:12.356792 1419 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:12.448187 kubelet[1419]: E0212 19:48:12.448155 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:12.448863 env[1111]: time="2024-02-12T19:48:12.448822661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r5qlv,Uid:03a8f03e-d0f7-42d1-8295-263c60930a8d,Namespace:kube-system,Attempt:0,}" Feb 12 19:48:12.449920 kubelet[1419]: E0212 19:48:12.449908 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:12.450314 env[1111]: time="2024-02-12T19:48:12.450263603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4cc6n,Uid:38d2e949-a180-4c61-9e4a-aae1737f5bdb,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:13.132532 kubelet[1419]: E0212 19:48:13.132504 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:13.424622 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3128713741.mount: Deactivated successfully. Feb 12 19:48:13.431293 env[1111]: time="2024-02-12T19:48:13.431244031Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:13.432048 env[1111]: time="2024-02-12T19:48:13.432020928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:13.434127 env[1111]: time="2024-02-12T19:48:13.434100978Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:13.435103 env[1111]: time="2024-02-12T19:48:13.435078280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:13.436424 env[1111]: time="2024-02-12T19:48:13.436396762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:13.437563 env[1111]: time="2024-02-12T19:48:13.437537622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:13.438908 env[1111]: time="2024-02-12T19:48:13.438878796Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:13.440094 env[1111]: time="2024-02-12T19:48:13.440070871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:13.458954 env[1111]: time="2024-02-12T19:48:13.458898613Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:13.458954 env[1111]: time="2024-02-12T19:48:13.458930333Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:13.458954 env[1111]: time="2024-02-12T19:48:13.458939991Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:13.459122 env[1111]: time="2024-02-12T19:48:13.459060767Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a pid=1506 runtime=io.containerd.runc.v2 Feb 12 19:48:13.459890 env[1111]: time="2024-02-12T19:48:13.459857251Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:13.459993 env[1111]: time="2024-02-12T19:48:13.459970784Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:13.460081 env[1111]: time="2024-02-12T19:48:13.460058398Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:13.460240 env[1111]: time="2024-02-12T19:48:13.460218087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cae2428e6e955220d5f1879366af58b1c5686951b1ed428d80bad09db0ba6e13 pid=1508 runtime=io.containerd.runc.v2 Feb 12 19:48:13.469557 systemd[1]: Started cri-containerd-14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a.scope. Feb 12 19:48:13.475186 systemd[1]: Started cri-containerd-cae2428e6e955220d5f1879366af58b1c5686951b1ed428d80bad09db0ba6e13.scope. Feb 12 19:48:13.478601 kernel: kauditd_printk_skb: 416 callbacks suppressed Feb 12 19:48:13.478683 kernel: audit: type=1400 audit(1707767293.476:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.486026 kernel: audit: type=1400 audit(1707767293.476:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.486074 kernel: audit: type=1400 audit(1707767293.476:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.486094 kernel: audit: type=1400 audit(1707767293.476:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.490448 kernel: audit: type=1400 audit(1707767293.476:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.490571 kernel: audit: type=1400 audit(1707767293.476:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.490590 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.493041 kernel: audit: type=1400 audit(1707767293.476:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.493082 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495818 kernel: audit: type=1400 audit(1707767293.476:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit: BPF prog-id=67 op=LOAD Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1506 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393239633861366334643039316432656462643139633737383637 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1506 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393239633861366334643039316432656462643139633737383637 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.477000 audit: BPF prog-id=68 op=LOAD Feb 12 19:48:13.477000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025c70 items=0 ppid=1506 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393239633861366334643039316432656462643139633737383637 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.483000 audit: BPF prog-id=69 op=LOAD Feb 12 19:48:13.483000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025cb8 items=0 ppid=1506 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393239633861366334643039316432656462643139633737383637 Feb 12 19:48:13.485000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:48:13.485000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { perfmon } for pid=1524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit[1524]: AVC avc: denied { bpf } for pid=1524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit: BPF prog-id=70 op=LOAD Feb 12 19:48:13.485000 audit[1524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035e0c8 items=0 ppid=1506 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393239633861366334643039316432656462643139633737383637 Feb 12 19:48:13.492000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.492000 audit[1530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1508 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653234323865366539353532323064356631383739333636616635 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1508 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653234323865366539353532323064356631383739333636616635 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit: BPF prog-id=72 op=LOAD Feb 12 19:48:13.495000 audit[1530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000288be0 items=0 ppid=1508 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653234323865366539353532323064356631383739333636616635 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit: BPF prog-id=73 op=LOAD Feb 12 19:48:13.495000 audit[1530]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000288c28 items=0 ppid=1508 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653234323865366539353532323064356631383739333636616635 Feb 12 19:48:13.495000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:48:13.495000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { perfmon } for pid=1530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit[1530]: AVC avc: denied { bpf } for pid=1530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:13.495000 audit: BPF prog-id=74 op=LOAD Feb 12 19:48:13.495000 audit[1530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000289038 items=0 ppid=1508 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:13.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361653234323865366539353532323064356631383739333636616635 Feb 12 19:48:13.504622 env[1111]: time="2024-02-12T19:48:13.504578834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4cc6n,Uid:38d2e949-a180-4c61-9e4a-aae1737f5bdb,Namespace:calico-system,Attempt:0,} returns sandbox id \"14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a\"" Feb 12 19:48:13.505498 kubelet[1419]: E0212 19:48:13.505473 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:13.506193 env[1111]: time="2024-02-12T19:48:13.506166380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:48:13.506589 env[1111]: time="2024-02-12T19:48:13.506555260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r5qlv,Uid:03a8f03e-d0f7-42d1-8295-263c60930a8d,Namespace:kube-system,Attempt:0,} returns sandbox id \"cae2428e6e955220d5f1879366af58b1c5686951b1ed428d80bad09db0ba6e13\"" Feb 12 19:48:13.506962 kubelet[1419]: E0212 19:48:13.506948 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:14.133492 kubelet[1419]: E0212 19:48:14.133465 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:14.206914 kubelet[1419]: E0212 19:48:14.206898 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:14.869179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1816302608.mount: Deactivated successfully. Feb 12 19:48:15.134405 kubelet[1419]: E0212 19:48:15.134309 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:15.609442 env[1111]: time="2024-02-12T19:48:15.609399021Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:15.611265 env[1111]: time="2024-02-12T19:48:15.611239041Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:15.613067 env[1111]: time="2024-02-12T19:48:15.613022255Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:15.614857 env[1111]: time="2024-02-12T19:48:15.614825225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:15.615775 env[1111]: time="2024-02-12T19:48:15.615743427Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:48:15.616217 env[1111]: time="2024-02-12T19:48:15.616192188Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 19:48:15.617433 env[1111]: time="2024-02-12T19:48:15.617397468Z" level=info msg="CreateContainer within sandbox \"14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:48:15.630522 env[1111]: time="2024-02-12T19:48:15.630484687Z" level=info msg="CreateContainer within sandbox \"14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"529a108333903462bb00126dfc76f6209240f89060872453d21f10bad4665509\"" Feb 12 19:48:15.630954 env[1111]: time="2024-02-12T19:48:15.630922017Z" level=info msg="StartContainer for \"529a108333903462bb00126dfc76f6209240f89060872453d21f10bad4665509\"" Feb 12 19:48:15.645098 systemd[1]: Started cri-containerd-529a108333903462bb00126dfc76f6209240f89060872453d21f10bad4665509.scope. Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f1f613b5208 items=0 ppid=1506 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:15.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396131303833333339303334363262623030313236646663373666 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.654000 audit: BPF prog-id=75 op=LOAD Feb 12 19:48:15.654000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001f3f78 items=0 ppid=1506 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:15.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396131303833333339303334363262623030313236646663373666 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit: BPF prog-id=76 op=LOAD Feb 12 19:48:15.655000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001f3fc8 items=0 ppid=1506 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:15.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396131303833333339303334363262623030313236646663373666 Feb 12 19:48:15.655000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:48:15.655000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { perfmon } for pid=1582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit[1582]: AVC avc: denied { bpf } for pid=1582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:15.655000 audit: BPF prog-id=77 op=LOAD Feb 12 19:48:15.655000 audit[1582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003ac058 items=0 ppid=1506 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:15.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532396131303833333339303334363262623030313236646663373666 Feb 12 19:48:15.666351 env[1111]: time="2024-02-12T19:48:15.666289531Z" level=info msg="StartContainer for \"529a108333903462bb00126dfc76f6209240f89060872453d21f10bad4665509\" returns successfully" Feb 12 19:48:15.674635 systemd[1]: cri-containerd-529a108333903462bb00126dfc76f6209240f89060872453d21f10bad4665509.scope: Deactivated successfully. Feb 12 19:48:15.679000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:48:15.689992 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-529a108333903462bb00126dfc76f6209240f89060872453d21f10bad4665509-rootfs.mount: Deactivated successfully. Feb 12 19:48:15.765871 env[1111]: time="2024-02-12T19:48:15.765825681Z" level=info msg="shim disconnected" id=529a108333903462bb00126dfc76f6209240f89060872453d21f10bad4665509 Feb 12 19:48:15.766008 env[1111]: time="2024-02-12T19:48:15.765875655Z" level=warning msg="cleaning up after shim disconnected" id=529a108333903462bb00126dfc76f6209240f89060872453d21f10bad4665509 namespace=k8s.io Feb 12 19:48:15.766008 env[1111]: time="2024-02-12T19:48:15.765885213Z" level=info msg="cleaning up dead shim" Feb 12 19:48:15.771338 env[1111]: time="2024-02-12T19:48:15.771296328Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1622 runtime=io.containerd.runc.v2\n" Feb 12 19:48:16.134789 kubelet[1419]: E0212 19:48:16.134750 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:16.206617 kubelet[1419]: E0212 19:48:16.206573 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:16.217323 kubelet[1419]: E0212 19:48:16.217298 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:16.707935 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4163280755.mount: Deactivated successfully. Feb 12 19:48:17.135961 kubelet[1419]: E0212 19:48:17.135875 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:17.220026 env[1111]: time="2024-02-12T19:48:17.219989187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:17.221513 env[1111]: time="2024-02-12T19:48:17.221474813Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:17.222851 env[1111]: time="2024-02-12T19:48:17.222822910Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:17.224063 env[1111]: time="2024-02-12T19:48:17.224032549Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:17.224442 env[1111]: time="2024-02-12T19:48:17.224412822Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 12 19:48:17.225076 env[1111]: time="2024-02-12T19:48:17.225056549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:48:17.225836 env[1111]: time="2024-02-12T19:48:17.225813147Z" level=info msg="CreateContainer within sandbox \"cae2428e6e955220d5f1879366af58b1c5686951b1ed428d80bad09db0ba6e13\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:48:17.237861 env[1111]: time="2024-02-12T19:48:17.237813708Z" level=info msg="CreateContainer within sandbox \"cae2428e6e955220d5f1879366af58b1c5686951b1ed428d80bad09db0ba6e13\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"30f84af0ded40d3078cfcdd237f00c3c5c9f8da7f5504688c1110234f54b92ae\"" Feb 12 19:48:17.238345 env[1111]: time="2024-02-12T19:48:17.238303837Z" level=info msg="StartContainer for \"30f84af0ded40d3078cfcdd237f00c3c5c9f8da7f5504688c1110234f54b92ae\"" Feb 12 19:48:17.250825 systemd[1]: Started cri-containerd-30f84af0ded40d3078cfcdd237f00c3c5c9f8da7f5504688c1110234f54b92ae.scope. Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7feaa8734aa8 items=0 ppid=1508 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663834616630646564343064333037386366636464323337663030 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit: BPF prog-id=78 op=LOAD Feb 12 19:48:17.261000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0003ea038 items=0 ppid=1508 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663834616630646564343064333037386366636464323337663030 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit: BPF prog-id=79 op=LOAD Feb 12 19:48:17.261000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0003ea088 items=0 ppid=1508 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663834616630646564343064333037386366636464323337663030 Feb 12 19:48:17.261000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:48:17.261000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { perfmon } for pid=1646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit[1646]: AVC avc: denied { bpf } for pid=1646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:17.261000 audit: BPF prog-id=80 op=LOAD Feb 12 19:48:17.261000 audit[1646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0003ea118 items=0 ppid=1508 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330663834616630646564343064333037386366636464323337663030 Feb 12 19:48:17.273741 env[1111]: time="2024-02-12T19:48:17.273687301Z" level=info msg="StartContainer for \"30f84af0ded40d3078cfcdd237f00c3c5c9f8da7f5504688c1110234f54b92ae\" returns successfully" Feb 12 19:48:17.323000 audit[1698]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.323000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0bd235e0 a2=0 a3=7fff0bd235cc items=0 ppid=1657 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:48:17.323000 audit[1699]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.323000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff81d6cea0 a2=0 a3=7fff81d6ce8c items=0 ppid=1657 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:48:17.324000 audit[1700]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.324000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc32a63a70 a2=0 a3=7ffc32a63a5c items=0 ppid=1657 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:48:17.324000 audit[1701]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.324000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1a9352f0 a2=0 a3=7fff1a9352dc items=0 ppid=1657 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:48:17.325000 audit[1702]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.325000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe67af0730 a2=0 a3=7ffe67af071c items=0 ppid=1657 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:48:17.326000 audit[1703]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.326000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff7c05a30 a2=0 a3=7ffff7c05a1c items=0 ppid=1657 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.326000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:48:17.424000 audit[1704]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.424000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc8ae8dea0 a2=0 a3=7ffc8ae8de8c items=0 ppid=1657 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:48:17.426000 audit[1706]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.426000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd0a2ce730 a2=0 a3=7ffd0a2ce71c items=0 ppid=1657 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:48:17.429000 audit[1709]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.429000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9d77aac0 a2=0 a3=7ffd9d77aaac items=0 ppid=1657 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:48:17.430000 audit[1710]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.430000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff81c55c40 a2=0 a3=7fff81c55c2c items=0 ppid=1657 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:48:17.431000 audit[1712]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.431000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5cb6fce0 a2=0 a3=7ffd5cb6fccc items=0 ppid=1657 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:48:17.432000 audit[1713]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.432000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdda21fae0 a2=0 a3=7ffdda21facc items=0 ppid=1657 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:48:17.434000 audit[1715]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.434000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd36e4ce20 a2=0 a3=7ffd36e4ce0c items=0 ppid=1657 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:48:17.437000 audit[1718]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.437000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeac4fdd50 a2=0 a3=7ffeac4fdd3c items=0 ppid=1657 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:48:17.438000 audit[1719]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.438000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe67102d90 a2=0 a3=7ffe67102d7c items=0 ppid=1657 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:48:17.439000 audit[1721]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.439000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe75122160 a2=0 a3=7ffe7512214c items=0 ppid=1657 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:48:17.440000 audit[1722]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.440000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff23b94e50 a2=0 a3=7fff23b94e3c items=0 ppid=1657 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:48:17.442000 audit[1724]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.442000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb2b23150 a2=0 a3=7ffeb2b2313c items=0 ppid=1657 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:48:17.445000 audit[1727]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.445000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbfb23630 a2=0 a3=7fffbfb2361c items=0 ppid=1657 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:48:17.447000 audit[1730]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.447000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffa31cb00 a2=0 a3=7ffffa31caec items=0 ppid=1657 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:48:17.448000 audit[1731]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.448000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffdfeccc30 a2=0 a3=7fffdfeccc1c items=0 ppid=1657 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:48:17.450000 audit[1733]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.450000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd1f751440 a2=0 a3=7ffd1f75142c items=0 ppid=1657 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:48:17.467000 audit[1738]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.467000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffada93660 a2=0 a3=7fffada9364c items=0 ppid=1657 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:48:17.468000 audit[1739]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.468000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5fb96060 a2=0 a3=7ffe5fb9604c items=0 ppid=1657 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:48:17.470000 audit[1741]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:17.470000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffef7943ce0 a2=0 a3=7ffef7943ccc items=0 ppid=1657 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:48:17.480000 audit[1747]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:17.480000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe68c8bdf0 a2=0 a3=7ffe68c8bddc items=0 ppid=1657 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:17.495000 audit[1747]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:17.495000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe68c8bdf0 a2=0 a3=7ffe68c8bddc items=0 ppid=1657 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:17.496000 audit[1753]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.496000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffedce5a310 a2=0 a3=7ffedce5a2fc items=0 ppid=1657 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:48:17.498000 audit[1755]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.498000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4348ec60 a2=0 a3=7ffe4348ec4c items=0 ppid=1657 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.498000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:48:17.501000 audit[1758]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.501000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffefe8cd2e0 a2=0 a3=7ffefe8cd2cc items=0 ppid=1657 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:48:17.502000 audit[1759]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.502000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca08ebe70 a2=0 a3=7ffca08ebe5c items=0 ppid=1657 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:48:17.503000 audit[1761]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.503000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc11dbfb70 a2=0 a3=7ffc11dbfb5c items=0 ppid=1657 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:48:17.504000 audit[1762]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.504000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbae4bd60 a2=0 a3=7ffdbae4bd4c items=0 ppid=1657 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:48:17.506000 audit[1764]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.506000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeed6d6200 a2=0 a3=7ffeed6d61ec items=0 ppid=1657 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:48:17.509000 audit[1767]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.509000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff59e3e790 a2=0 a3=7fff59e3e77c items=0 ppid=1657 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:48:17.510000 audit[1768]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.510000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd014fee70 a2=0 a3=7ffd014fee5c items=0 ppid=1657 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:48:17.511000 audit[1770]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.511000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc5555cb0 a2=0 a3=7ffcc5555c9c items=0 ppid=1657 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:48:17.512000 audit[1771]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.512000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefd0d9180 a2=0 a3=7ffefd0d916c items=0 ppid=1657 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:48:17.514000 audit[1773]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.514000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff19643950 a2=0 a3=7fff1964393c items=0 ppid=1657 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:48:17.517000 audit[1776]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.517000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc9f568a20 a2=0 a3=7ffc9f568a0c items=0 ppid=1657 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:48:17.519000 audit[1779]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.519000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff54af5760 a2=0 a3=7fff54af574c items=0 ppid=1657 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:48:17.520000 audit[1780]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.520000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd782b8d00 a2=0 a3=7ffd782b8cec items=0 ppid=1657 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:48:17.522000 audit[1782]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.522000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff0581dc00 a2=0 a3=7fff0581dbec items=0 ppid=1657 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:48:17.524000 audit[1785]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.524000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd7d676460 a2=0 a3=7ffd7d67644c items=0 ppid=1657 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:48:17.525000 audit[1786]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.525000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0b172c80 a2=0 a3=7fff0b172c6c items=0 ppid=1657 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:48:17.527000 audit[1788]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.527000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc53e6a4e0 a2=0 a3=7ffc53e6a4cc items=0 ppid=1657 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:48:17.528000 audit[1789]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.528000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc88126270 a2=0 a3=7ffc8812625c items=0 ppid=1657 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:48:17.529000 audit[1791]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.529000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff45b16320 a2=0 a3=7fff45b1630c items=0 ppid=1657 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:48:17.532000 audit[1794]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:17.532000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe2a698580 a2=0 a3=7ffe2a69856c items=0 ppid=1657 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:48:17.534000 audit[1796]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:48:17.534000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffeb6fd7f10 a2=0 a3=7ffeb6fd7efc items=0 ppid=1657 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.534000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:17.534000 audit[1796]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:48:17.534000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffeb6fd7f10 a2=0 a3=7ffeb6fd7efc items=0 ppid=1657 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:17.534000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:18.136463 kubelet[1419]: E0212 19:48:18.136430 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:18.207342 kubelet[1419]: E0212 19:48:18.207306 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:18.220406 kubelet[1419]: E0212 19:48:18.220387 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:18.227071 kubelet[1419]: I0212 19:48:18.227039 1419 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-r5qlv" podStartSLOduration=3.509681432 podCreationTimestamp="2024-02-12 19:48:11 +0000 UTC" firstStartedPulling="2024-02-12 19:48:13.507330203 +0000 UTC m=+3.718786295" lastFinishedPulling="2024-02-12 19:48:17.224639396 +0000 UTC m=+7.436095488" observedRunningTime="2024-02-12 19:48:18.226617996 +0000 UTC m=+8.438074098" watchObservedRunningTime="2024-02-12 19:48:18.226990625 +0000 UTC m=+8.438446747" Feb 12 19:48:18.828741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3487376568.mount: Deactivated successfully. Feb 12 19:48:19.137002 kubelet[1419]: E0212 19:48:19.136919 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:19.221737 kubelet[1419]: E0212 19:48:19.221712 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:20.137743 kubelet[1419]: E0212 19:48:20.137708 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:20.207443 kubelet[1419]: E0212 19:48:20.207403 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:21.138652 kubelet[1419]: E0212 19:48:21.138618 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:22.139433 kubelet[1419]: E0212 19:48:22.139399 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:22.206806 kubelet[1419]: E0212 19:48:22.206781 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:23.125000 audit[1798]: NETFILTER_CFG table=filter:65 family=2 entries=15 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:23.129423 kernel: kauditd_printk_skb: 346 callbacks suppressed Feb 12 19:48:23.129474 kernel: audit: type=1325 audit(1707767303.125:658): table=filter:65 family=2 entries=15 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:23.129496 kernel: audit: type=1300 audit(1707767303.125:658): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd0814f190 a2=0 a3=7ffd0814f17c items=0 ppid=1657 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.125000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd0814f190 a2=0 a3=7ffd0814f17c items=0 ppid=1657 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.132544 kernel: audit: type=1327 audit(1707767303.125:658): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:23.125000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:23.135000 audit[1798]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:23.135000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd0814f190 a2=0 a3=7ffd0814f17c items=0 ppid=1657 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.140184 kubelet[1419]: E0212 19:48:23.140157 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:23.141409 kernel: audit: type=1325 audit(1707767303.135:659): table=nat:66 family=2 entries=19 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:23.141456 kernel: audit: type=1300 audit(1707767303.135:659): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd0814f190 a2=0 a3=7ffd0814f17c items=0 ppid=1657 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.141474 kernel: audit: type=1327 audit(1707767303.135:659): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:23.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:23.408722 env[1111]: time="2024-02-12T19:48:23.408682656Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:23.410961 env[1111]: time="2024-02-12T19:48:23.410931573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:23.418651 env[1111]: time="2024-02-12T19:48:23.418609198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:23.420118 env[1111]: time="2024-02-12T19:48:23.420087590Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:23.420840 env[1111]: time="2024-02-12T19:48:23.420803322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:48:23.422407 env[1111]: time="2024-02-12T19:48:23.422375139Z" level=info msg="CreateContainer within sandbox \"14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:48:23.435141 env[1111]: time="2024-02-12T19:48:23.435104928Z" level=info msg="CreateContainer within sandbox \"14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7c25443c9cc952a80e5fdb50fdb9cad8b0a43ee924f7a21dd507fbee016b0d2c\"" Feb 12 19:48:23.435587 env[1111]: time="2024-02-12T19:48:23.435562455Z" level=info msg="StartContainer for \"7c25443c9cc952a80e5fdb50fdb9cad8b0a43ee924f7a21dd507fbee016b0d2c\"" Feb 12 19:48:23.449564 systemd[1]: Started cri-containerd-7c25443c9cc952a80e5fdb50fdb9cad8b0a43ee924f7a21dd507fbee016b0d2c.scope. Feb 12 19:48:23.472226 kernel: audit: type=1400 audit(1707767303.458:660): avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.472424 kernel: audit: type=1300 audit(1707767303.458:660): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fafae149b18 items=0 ppid=1506 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.472460 kernel: audit: type=1327 audit(1707767303.458:660): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323534343363396363393532613830653566646235306664623963 Feb 12 19:48:23.472487 kernel: audit: type=1400 audit(1707767303.458:661): avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fafae149b18 items=0 ppid=1506 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323534343363396363393532613830653566646235306664623963 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.458000 audit: BPF prog-id=81 op=LOAD Feb 12 19:48:23.458000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00028a6c8 items=0 ppid=1506 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323534343363396363393532613830653566646235306664623963 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.464000 audit: BPF prog-id=82 op=LOAD Feb 12 19:48:23.464000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00028a718 items=0 ppid=1506 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323534343363396363393532613830653566646235306664623963 Feb 12 19:48:23.468000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:48:23.468000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:23.468000 audit: BPF prog-id=83 op=LOAD Feb 12 19:48:23.468000 audit[1806]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00028a7a8 items=0 ppid=1506 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763323534343363396363393532613830653566646235306664623963 Feb 12 19:48:23.483106 env[1111]: time="2024-02-12T19:48:23.483053491Z" level=info msg="StartContainer for \"7c25443c9cc952a80e5fdb50fdb9cad8b0a43ee924f7a21dd507fbee016b0d2c\" returns successfully" Feb 12 19:48:24.140407 kubelet[1419]: E0212 19:48:24.140367 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:24.206960 kubelet[1419]: E0212 19:48:24.206934 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:24.227774 kubelet[1419]: E0212 19:48:24.227747 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:24.410451 env[1111]: time="2024-02-12T19:48:24.410345253Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:48:24.412155 systemd[1]: cri-containerd-7c25443c9cc952a80e5fdb50fdb9cad8b0a43ee924f7a21dd507fbee016b0d2c.scope: Deactivated successfully. Feb 12 19:48:24.416000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:48:24.430336 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7c25443c9cc952a80e5fdb50fdb9cad8b0a43ee924f7a21dd507fbee016b0d2c-rootfs.mount: Deactivated successfully. Feb 12 19:48:24.504405 kubelet[1419]: I0212 19:48:24.504384 1419 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:48:24.917790 env[1111]: time="2024-02-12T19:48:24.917724830Z" level=info msg="shim disconnected" id=7c25443c9cc952a80e5fdb50fdb9cad8b0a43ee924f7a21dd507fbee016b0d2c Feb 12 19:48:24.917790 env[1111]: time="2024-02-12T19:48:24.917777929Z" level=warning msg="cleaning up after shim disconnected" id=7c25443c9cc952a80e5fdb50fdb9cad8b0a43ee924f7a21dd507fbee016b0d2c namespace=k8s.io Feb 12 19:48:24.917790 env[1111]: time="2024-02-12T19:48:24.917788048Z" level=info msg="cleaning up dead shim" Feb 12 19:48:24.922967 env[1111]: time="2024-02-12T19:48:24.922934948Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1855 runtime=io.containerd.runc.v2\n" Feb 12 19:48:25.140978 kubelet[1419]: E0212 19:48:25.140937 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:25.230846 kubelet[1419]: E0212 19:48:25.230482 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:25.231105 env[1111]: time="2024-02-12T19:48:25.231075813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:48:26.141691 kubelet[1419]: E0212 19:48:26.141637 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:26.211153 systemd[1]: Created slice kubepods-besteffort-podbb7e11a9_b9b7_4de6_980f_5bf9f9111203.slice. Feb 12 19:48:26.212556 env[1111]: time="2024-02-12T19:48:26.212526633Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sjfgx,Uid:bb7e11a9-b9b7-4de6-980f-5bf9f9111203,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:26.258685 env[1111]: time="2024-02-12T19:48:26.258615209Z" level=error msg="Failed to destroy network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:26.258990 env[1111]: time="2024-02-12T19:48:26.258956989Z" level=error msg="encountered an error cleaning up failed sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:26.259028 env[1111]: time="2024-02-12T19:48:26.259006903Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sjfgx,Uid:bb7e11a9-b9b7-4de6-980f-5bf9f9111203,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:26.259252 kubelet[1419]: E0212 19:48:26.259223 1419 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:26.259400 kubelet[1419]: E0212 19:48:26.259308 1419 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-sjfgx" Feb 12 19:48:26.259400 kubelet[1419]: E0212 19:48:26.259327 1419 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-sjfgx" Feb 12 19:48:26.259400 kubelet[1419]: E0212 19:48:26.259372 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-sjfgx_calico-system(bb7e11a9-b9b7-4de6-980f-5bf9f9111203)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-sjfgx_calico-system(bb7e11a9-b9b7-4de6-980f-5bf9f9111203)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:26.259897 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69-shm.mount: Deactivated successfully. Feb 12 19:48:26.927000 audit[1903]: NETFILTER_CFG table=filter:67 family=2 entries=14 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.927000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc3be74bf0 a2=0 a3=7ffc3be74bdc items=0 ppid=1657 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:26.932000 audit[1903]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.932000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffc3be74bf0 a2=0 a3=31030 items=0 ppid=1657 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:26.944000 audit[1905]: NETFILTER_CFG table=filter:69 family=2 entries=11 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.944000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff8e1e4e50 a2=0 a3=7fff8e1e4e3c items=0 ppid=1657 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.944000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:26.945000 audit[1905]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:26.945000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff8e1e4e50 a2=0 a3=7fff8e1e4e3c items=0 ppid=1657 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:26.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:27.142159 kubelet[1419]: E0212 19:48:27.142114 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:27.234564 kubelet[1419]: I0212 19:48:27.234467 1419 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:48:27.235189 env[1111]: time="2024-02-12T19:48:27.235150412Z" level=info msg="StopPodSandbox for \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\"" Feb 12 19:48:27.255618 env[1111]: time="2024-02-12T19:48:27.255563847Z" level=error msg="StopPodSandbox for \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\" failed" error="failed to destroy network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:27.255867 kubelet[1419]: E0212 19:48:27.255839 1419 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:48:27.255920 kubelet[1419]: E0212 19:48:27.255910 1419 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69"} Feb 12 19:48:27.255953 kubelet[1419]: E0212 19:48:27.255946 1419 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bb7e11a9-b9b7-4de6-980f-5bf9f9111203\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:27.256015 kubelet[1419]: E0212 19:48:27.255974 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bb7e11a9-b9b7-4de6-980f-5bf9f9111203\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-sjfgx" podUID="bb7e11a9-b9b7-4de6-980f-5bf9f9111203" Feb 12 19:48:28.142833 kubelet[1419]: E0212 19:48:28.142779 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:28.947000 audit[1933]: NETFILTER_CFG table=filter:71 family=2 entries=8 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:28.949617 kernel: kauditd_printk_skb: 52 callbacks suppressed Feb 12 19:48:28.949678 kernel: audit: type=1325 audit(1707767308.947:671): table=filter:71 family=2 entries=8 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:28.947000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffa74175d0 a2=0 a3=7fffa74175bc items=0 ppid=1657 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.954300 kernel: audit: type=1300 audit(1707767308.947:671): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffa74175d0 a2=0 a3=7fffa74175bc items=0 ppid=1657 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.954357 kernel: audit: type=1327 audit(1707767308.947:671): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:28.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:28.959000 audit[1933]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:28.959000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fffa74175d0 a2=0 a3=7fffa74175bc items=0 ppid=1657 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.966935 kernel: audit: type=1325 audit(1707767308.959:672): table=nat:72 family=2 entries=56 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:28.966973 kernel: audit: type=1300 audit(1707767308.959:672): arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fffa74175d0 a2=0 a3=7fffa74175bc items=0 ppid=1657 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:28.966998 kernel: audit: type=1327 audit(1707767308.959:672): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:28.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:29.143229 kubelet[1419]: E0212 19:48:29.143187 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:29.343913 kubelet[1419]: I0212 19:48:29.343815 1419 topology_manager.go:215] "Topology Admit Handler" podUID="579e955c-0c83-41fb-851a-13a7af45b100" podNamespace="default" podName="nginx-deployment-6d5f899847-fpdg6" Feb 12 19:48:29.348432 systemd[1]: Created slice kubepods-besteffort-pod579e955c_0c83_41fb_851a_13a7af45b100.slice. Feb 12 19:48:29.443869 kubelet[1419]: I0212 19:48:29.443823 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sjhjs\" (UniqueName: \"kubernetes.io/projected/579e955c-0c83-41fb-851a-13a7af45b100-kube-api-access-sjhjs\") pod \"nginx-deployment-6d5f899847-fpdg6\" (UID: \"579e955c-0c83-41fb-851a-13a7af45b100\") " pod="default/nginx-deployment-6d5f899847-fpdg6" Feb 12 19:48:29.651404 env[1111]: time="2024-02-12T19:48:29.651300843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-fpdg6,Uid:579e955c-0c83-41fb-851a-13a7af45b100,Namespace:default,Attempt:0,}" Feb 12 19:48:30.078280 env[1111]: time="2024-02-12T19:48:30.078204584Z" level=error msg="Failed to destroy network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:30.078554 env[1111]: time="2024-02-12T19:48:30.078525362Z" level=error msg="encountered an error cleaning up failed sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:30.078602 env[1111]: time="2024-02-12T19:48:30.078570410Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-fpdg6,Uid:579e955c-0c83-41fb-851a-13a7af45b100,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:30.078800 kubelet[1419]: E0212 19:48:30.078779 1419 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:30.078865 kubelet[1419]: E0212 19:48:30.078831 1419 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-fpdg6" Feb 12 19:48:30.078865 kubelet[1419]: E0212 19:48:30.078850 1419 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-fpdg6" Feb 12 19:48:30.078916 kubelet[1419]: E0212 19:48:30.078893 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-fpdg6_default(579e955c-0c83-41fb-851a-13a7af45b100)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-fpdg6_default(579e955c-0c83-41fb-851a-13a7af45b100)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-fpdg6" podUID="579e955c-0c83-41fb-851a-13a7af45b100" Feb 12 19:48:30.079596 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e-shm.mount: Deactivated successfully. Feb 12 19:48:30.130526 kubelet[1419]: E0212 19:48:30.130498 1419 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:30.143790 kubelet[1419]: E0212 19:48:30.143764 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:30.240626 kubelet[1419]: I0212 19:48:30.240597 1419 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:48:30.241193 env[1111]: time="2024-02-12T19:48:30.241150522Z" level=info msg="StopPodSandbox for \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\"" Feb 12 19:48:30.261383 env[1111]: time="2024-02-12T19:48:30.261330730Z" level=error msg="StopPodSandbox for \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\" failed" error="failed to destroy network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:30.261572 kubelet[1419]: E0212 19:48:30.261516 1419 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:48:30.261635 kubelet[1419]: E0212 19:48:30.261591 1419 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e"} Feb 12 19:48:30.261635 kubelet[1419]: E0212 19:48:30.261625 1419 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"579e955c-0c83-41fb-851a-13a7af45b100\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:30.261722 kubelet[1419]: E0212 19:48:30.261651 1419 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"579e955c-0c83-41fb-851a-13a7af45b100\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-fpdg6" podUID="579e955c-0c83-41fb-851a-13a7af45b100" Feb 12 19:48:30.786892 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3819592348.mount: Deactivated successfully. Feb 12 19:48:31.144186 kubelet[1419]: E0212 19:48:31.144123 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:31.234966 env[1111]: time="2024-02-12T19:48:31.234924057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:31.236518 env[1111]: time="2024-02-12T19:48:31.236491465Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:31.237892 env[1111]: time="2024-02-12T19:48:31.237855842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:31.239187 env[1111]: time="2024-02-12T19:48:31.239153762Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:31.239521 env[1111]: time="2024-02-12T19:48:31.239497543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:48:31.247693 env[1111]: time="2024-02-12T19:48:31.247666494Z" level=info msg="CreateContainer within sandbox \"14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:48:31.258517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3074860242.mount: Deactivated successfully. Feb 12 19:48:31.263584 env[1111]: time="2024-02-12T19:48:31.263548908Z" level=info msg="CreateContainer within sandbox \"14929c8a6c4d091d2edbd19c778672637705e3e52d739420606bc0c9fce4e60a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"44671d9a582d25430da6548c2de1ea76a65e1cc45276af84f3ed26dc86d1aecb\"" Feb 12 19:48:31.263968 env[1111]: time="2024-02-12T19:48:31.263942997Z" level=info msg="StartContainer for \"44671d9a582d25430da6548c2de1ea76a65e1cc45276af84f3ed26dc86d1aecb\"" Feb 12 19:48:31.277063 systemd[1]: Started cri-containerd-44671d9a582d25430da6548c2de1ea76a65e1cc45276af84f3ed26dc86d1aecb.scope. Feb 12 19:48:31.297497 kernel: audit: type=1400 audit(1707767311.288:673): avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.297600 kernel: audit: type=1300 audit(1707767311.288:673): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f003778d7c8 items=0 ppid=1506 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.297629 kernel: audit: type=1327 audit(1707767311.288:673): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363731643961353832643235343330646136353438633264653165 Feb 12 19:48:31.288000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.288000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f003778d7c8 items=0 ppid=1506 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363731643961353832643235343330646136353438633264653165 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.299936 kernel: audit: type=1400 audit(1707767311.289:674): avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.289000 audit: BPF prog-id=84 op=LOAD Feb 12 19:48:31.289000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c8118 items=0 ppid=1506 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363731643961353832643235343330646136353438633264653165 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.294000 audit: BPF prog-id=85 op=LOAD Feb 12 19:48:31.294000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c8168 items=0 ppid=1506 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363731643961353832643235343330646136353438633264653165 Feb 12 19:48:31.298000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:48:31.298000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { perfmon } for pid=2007 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit[2007]: AVC avc: denied { bpf } for pid=2007 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.298000 audit: BPF prog-id=86 op=LOAD Feb 12 19:48:31.298000 audit[2007]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c81f8 items=0 ppid=1506 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363731643961353832643235343330646136353438633264653165 Feb 12 19:48:31.310626 env[1111]: time="2024-02-12T19:48:31.310507224Z" level=info msg="StartContainer for \"44671d9a582d25430da6548c2de1ea76a65e1cc45276af84f3ed26dc86d1aecb\" returns successfully" Feb 12 19:48:31.366295 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:48:31.366396 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:48:32.144482 kubelet[1419]: E0212 19:48:32.144428 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:32.246391 kubelet[1419]: E0212 19:48:32.246359 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:32.274772 kubelet[1419]: I0212 19:48:32.274743 1419 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4cc6n" podStartSLOduration=3.540861955 podCreationTimestamp="2024-02-12 19:48:11 +0000 UTC" firstStartedPulling="2024-02-12 19:48:13.505875866 +0000 UTC m=+3.717331958" lastFinishedPulling="2024-02-12 19:48:31.23971935 +0000 UTC m=+21.451175432" observedRunningTime="2024-02-12 19:48:32.274654301 +0000 UTC m=+22.486110393" watchObservedRunningTime="2024-02-12 19:48:32.274705429 +0000 UTC m=+22.486161521" Feb 12 19:48:32.536000 audit[2123]: AVC avc: denied { write } for pid=2123 comm="tee" name="fd" dev="proc" ino=21506 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:32.536000 audit[2123]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd733ad983 a2=241 a3=1b6 items=1 ppid=2078 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.536000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:48:32.536000 audit: PATH item=0 name="/dev/fd/63" inode=18423 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:32.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:32.538000 audit[2133]: AVC avc: denied { write } for pid=2133 comm="tee" name="fd" dev="proc" ino=21510 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:32.538000 audit[2133]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe77c54982 a2=241 a3=1b6 items=1 ppid=2074 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.538000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:48:32.538000 audit: PATH item=0 name="/dev/fd/63" inode=18428 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:32.538000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:32.539000 audit[2135]: AVC avc: denied { write } for pid=2135 comm="tee" name="fd" dev="proc" ino=21514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:32.539000 audit[2135]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff94e45992 a2=241 a3=1b6 items=1 ppid=2073 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.539000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:48:32.539000 audit: PATH item=0 name="/dev/fd/63" inode=18431 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:32.539000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:32.541000 audit[2142]: AVC avc: denied { write } for pid=2142 comm="tee" name="fd" dev="proc" ino=21518 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:32.541000 audit[2142]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd5c9a994 a2=241 a3=1b6 items=1 ppid=2085 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.541000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:48:32.541000 audit: PATH item=0 name="/dev/fd/63" inode=19281 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:32.541000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:32.543000 audit[2145]: AVC avc: denied { write } for pid=2145 comm="tee" name="fd" dev="proc" ino=21522 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:32.543000 audit[2145]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe048eb992 a2=241 a3=1b6 items=1 ppid=2083 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.543000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:48:32.543000 audit: PATH item=0 name="/dev/fd/63" inode=19793 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:32.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:32.554000 audit[2152]: AVC avc: denied { write } for pid=2152 comm="tee" name="fd" dev="proc" ino=21526 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:32.554000 audit[2152]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdea639992 a2=241 a3=1b6 items=1 ppid=2088 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.554000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:48:32.554000 audit: PATH item=0 name="/dev/fd/63" inode=19284 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:32.554000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:32.558000 audit[2149]: AVC avc: denied { write } for pid=2149 comm="tee" name="fd" dev="proc" ino=20653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:32.558000 audit[2149]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9015d993 a2=241 a3=1b6 items=1 ppid=2081 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.558000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:48:32.558000 audit: PATH item=0 name="/dev/fd/63" inode=20650 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:32.558000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:32.623501 kernel: Initializing XFRM netlink socket Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit: BPF prog-id=87 op=LOAD Feb 12 19:48:32.689000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd06ad4bc0 a2=70 a3=7fe08f309000 items=0 ppid=2090 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.689000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:32.689000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit: BPF prog-id=88 op=LOAD Feb 12 19:48:32.689000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd06ad4bc0 a2=70 a3=6e items=0 ppid=2090 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.689000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:32.689000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd06ad4b70 a2=70 a3=7ffd06ad4bc0 items=0 ppid=2090 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.689000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit: BPF prog-id=89 op=LOAD Feb 12 19:48:32.689000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd06ad4b50 a2=70 a3=7ffd06ad4bc0 items=0 ppid=2090 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.689000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:32.689000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd06ad4c30 a2=70 a3=0 items=0 ppid=2090 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.689000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd06ad4c20 a2=70 a3=0 items=0 ppid=2090 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.689000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:32.689000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.689000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd06ad4c60 a2=70 a3=0 items=0 ppid=2090 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.689000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.690000 audit: BPF prog-id=90 op=LOAD Feb 12 19:48:32.690000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd06ad4b80 a2=70 a3=ffffffff items=0 ppid=2090 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.690000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:32.692000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.692000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd87e98680 a2=70 a3=208 items=0 ppid=2090 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.692000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:48:32.692000 audit[2221]: AVC avc: denied { bpf } for pid=2221 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.692000 audit[2221]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd87e98550 a2=70 a3=3 items=0 ppid=2090 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.692000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:48:32.701000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:48:32.726000 audit[2246]: NETFILTER_CFG table=mangle:73 family=2 entries=19 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:32.726000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff48cef550 a2=0 a3=7fff48cef53c items=0 ppid=2090 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.726000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:32.729000 audit[2247]: NETFILTER_CFG table=raw:74 family=2 entries=19 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:32.729000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffea413e260 a2=0 a3=559cae7fb000 items=0 ppid=2090 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.729000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:32.731000 audit[2248]: NETFILTER_CFG table=nat:75 family=2 entries=16 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:32.731000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd41fbbe30 a2=0 a3=55f245f6a000 items=0 ppid=2090 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.731000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:32.732000 audit[2249]: NETFILTER_CFG table=filter:76 family=2 entries=39 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:32.732000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe776effb0 a2=0 a3=5610de14a000 items=0 ppid=2090 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:33.145600 kubelet[1419]: E0212 19:48:33.145546 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:33.247398 kubelet[1419]: I0212 19:48:33.247367 1419 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:48:33.248146 kubelet[1419]: E0212 19:48:33.248125 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:33.634530 systemd-networkd[1011]: vxlan.calico: Link UP Feb 12 19:48:33.634538 systemd-networkd[1011]: vxlan.calico: Gained carrier Feb 12 19:48:34.146061 kubelet[1419]: E0212 19:48:34.146021 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:34.733417 systemd-networkd[1011]: vxlan.calico: Gained IPv6LL Feb 12 19:48:35.146570 kubelet[1419]: E0212 19:48:35.146480 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:36.013889 kubelet[1419]: I0212 19:48:36.013841 1419 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:48:36.014557 kubelet[1419]: E0212 19:48:36.014538 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:48:36.026586 systemd[1]: run-containerd-runc-k8s.io-44671d9a582d25430da6548c2de1ea76a65e1cc45276af84f3ed26dc86d1aecb-runc.yFyr3m.mount: Deactivated successfully. Feb 12 19:48:36.146902 kubelet[1419]: E0212 19:48:36.146872 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:37.147343 kubelet[1419]: E0212 19:48:37.147299 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:38.148125 kubelet[1419]: E0212 19:48:38.148090 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:38.207448 env[1111]: time="2024-02-12T19:48:38.207389437Z" level=info msg="StopPodSandbox for \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\"" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.240 [INFO][2327] k8s.go 578: Cleaning up netns ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.240 [INFO][2327] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" iface="eth0" netns="/var/run/netns/cni-1a0e3aae-ef6a-fe81-0747-eb91394dcc01" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.241 [INFO][2327] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" iface="eth0" netns="/var/run/netns/cni-1a0e3aae-ef6a-fe81-0747-eb91394dcc01" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.241 [INFO][2327] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" iface="eth0" netns="/var/run/netns/cni-1a0e3aae-ef6a-fe81-0747-eb91394dcc01" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.241 [INFO][2327] k8s.go 585: Releasing IP address(es) ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.241 [INFO][2327] utils.go 188: Calico CNI releasing IP address ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.256 [INFO][2335] ipam_plugin.go 415: Releasing address using handleID ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.256 [INFO][2335] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.256 [INFO][2335] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.263 [WARNING][2335] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.263 [INFO][2335] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.264 [INFO][2335] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:38.266424 env[1111]: 2024-02-12 19:48:38.265 [INFO][2327] k8s.go 591: Teardown processing complete. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:48:38.266847 env[1111]: time="2024-02-12T19:48:38.266609725Z" level=info msg="TearDown network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\" successfully" Feb 12 19:48:38.266847 env[1111]: time="2024-02-12T19:48:38.266651886Z" level=info msg="StopPodSandbox for \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\" returns successfully" Feb 12 19:48:38.267750 systemd[1]: run-netns-cni\x2d1a0e3aae\x2def6a\x2dfe81\x2d0747\x2deb91394dcc01.mount: Deactivated successfully. Feb 12 19:48:38.268633 env[1111]: time="2024-02-12T19:48:38.268591264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sjfgx,Uid:bb7e11a9-b9b7-4de6-980f-5bf9f9111203,Namespace:calico-system,Attempt:1,}" Feb 12 19:48:38.352011 systemd-networkd[1011]: cali17a2bac3c4f: Link UP Feb 12 19:48:38.353632 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:48:38.353680 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali17a2bac3c4f: link becomes ready Feb 12 19:48:38.353715 systemd-networkd[1011]: cali17a2bac3c4f: Gained carrier Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.302 [INFO][2343] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-csi--node--driver--sjfgx-eth0 csi-node-driver- calico-system bb7e11a9-b9b7-4de6-980f-5bf9f9111203 911 0 2024-02-12 19:48:11 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 csi-node-driver-sjfgx eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali17a2bac3c4f [] []}} ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Namespace="calico-system" Pod="csi-node-driver-sjfgx" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--sjfgx-" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.302 [INFO][2343] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Namespace="calico-system" Pod="csi-node-driver-sjfgx" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.322 [INFO][2357] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" HandleID="k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.331 [INFO][2357] ipam_plugin.go 268: Auto assigning IP ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" HandleID="k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00058d450), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.143", "pod":"csi-node-driver-sjfgx", "timestamp":"2024-02-12 19:48:38.322594191 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.331 [INFO][2357] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.331 [INFO][2357] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.331 [INFO][2357] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.332 [INFO][2357] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.335 [INFO][2357] ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.338 [INFO][2357] ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.339 [INFO][2357] ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.341 [INFO][2357] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.341 [INFO][2357] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.342 [INFO][2357] ipam.go 1682: Creating new handle: k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8 Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.344 [INFO][2357] ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.347 [INFO][2357] ipam.go 1216: Successfully claimed IPs: [192.168.66.1/26] block=192.168.66.0/26 handle="k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.347 [INFO][2357] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.1/26] handle="k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" host="10.0.0.143" Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.347 [INFO][2357] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:38.363241 env[1111]: 2024-02-12 19:48:38.347 [INFO][2357] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.66.1/26] IPv6=[] ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" HandleID="k8s-pod-network.cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.366230 env[1111]: 2024-02-12 19:48:38.350 [INFO][2343] k8s.go 385: Populated endpoint ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Namespace="calico-system" Pod="csi-node-driver-sjfgx" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--sjfgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bb7e11a9-b9b7-4de6-980f-5bf9f9111203", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"csi-node-driver-sjfgx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali17a2bac3c4f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:38.366230 env[1111]: 2024-02-12 19:48:38.350 [INFO][2343] k8s.go 386: Calico CNI using IPs: [192.168.66.1/32] ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Namespace="calico-system" Pod="csi-node-driver-sjfgx" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.366230 env[1111]: 2024-02-12 19:48:38.350 [INFO][2343] dataplane_linux.go 68: Setting the host side veth name to cali17a2bac3c4f ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Namespace="calico-system" Pod="csi-node-driver-sjfgx" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.366230 env[1111]: 2024-02-12 19:48:38.353 [INFO][2343] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Namespace="calico-system" Pod="csi-node-driver-sjfgx" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.366230 env[1111]: 2024-02-12 19:48:38.354 [INFO][2343] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Namespace="calico-system" Pod="csi-node-driver-sjfgx" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--sjfgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bb7e11a9-b9b7-4de6-980f-5bf9f9111203", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8", Pod:"csi-node-driver-sjfgx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali17a2bac3c4f", MAC:"6e:7e:2e:22:ea:89", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:38.366230 env[1111]: 2024-02-12 19:48:38.361 [INFO][2343] k8s.go 491: Wrote updated endpoint to datastore ContainerID="cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8" Namespace="calico-system" Pod="csi-node-driver-sjfgx" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:48:38.373000 audit[2386]: NETFILTER_CFG table=filter:77 family=2 entries=36 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:38.375597 kernel: kauditd_printk_skb: 157 callbacks suppressed Feb 12 19:48:38.375645 kernel: audit: type=1325 audit(1707767318.373:704): table=filter:77 family=2 entries=36 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:38.375854 env[1111]: time="2024-02-12T19:48:38.375788946Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:38.375854 env[1111]: time="2024-02-12T19:48:38.375823582Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:38.375854 env[1111]: time="2024-02-12T19:48:38.375833422Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:38.376152 env[1111]: time="2024-02-12T19:48:38.376092455Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8 pid=2391 runtime=io.containerd.runc.v2 Feb 12 19:48:38.373000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff526b8080 a2=0 a3=7fff526b806c items=0 ppid=2090 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:38.382159 kernel: audit: type=1300 audit(1707767318.373:704): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff526b8080 a2=0 a3=7fff526b806c items=0 ppid=2090 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:38.382257 kernel: audit: type=1327 audit(1707767318.373:704): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:38.373000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:38.388625 systemd[1]: Started cri-containerd-cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8.scope. Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.401700 kernel: audit: type=1400 audit(1707767318.396:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.401739 kernel: audit: type=1400 audit(1707767318.396:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.403897 kernel: audit: type=1400 audit(1707767318.396:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.406507 kernel: audit: type=1400 audit(1707767318.396:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.406541 kernel: audit: type=1400 audit(1707767318.396:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.410462 kernel: audit: type=1400 audit(1707767318.396:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.410517 systemd-resolved[1058]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.412478 kernel: audit: type=1400 audit(1707767318.396:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit: BPF prog-id=91 op=LOAD Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2391 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:38.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362356364313139663236353131356564623632656164353862363663 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2391 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:38.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362356364313139663236353131356564623632656164353862363663 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.400000 audit: BPF prog-id=92 op=LOAD Feb 12 19:48:38.400000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000096520 items=0 ppid=2391 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:38.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362356364313139663236353131356564623632656164353862363663 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit: BPF prog-id=93 op=LOAD Feb 12 19:48:38.402000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000096568 items=0 ppid=2391 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:38.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362356364313139663236353131356564623632656164353862363663 Feb 12 19:48:38.402000 audit: BPF prog-id=93 op=UNLOAD Feb 12 19:48:38.402000 audit: BPF prog-id=92 op=UNLOAD Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:38.402000 audit: BPF prog-id=94 op=LOAD Feb 12 19:48:38.402000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000096978 items=0 ppid=2391 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:38.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362356364313139663236353131356564623632656164353862363663 Feb 12 19:48:38.419774 env[1111]: time="2024-02-12T19:48:38.419732718Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sjfgx,Uid:bb7e11a9-b9b7-4de6-980f-5bf9f9111203,Namespace:calico-system,Attempt:1,} returns sandbox id \"cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8\"" Feb 12 19:48:38.421230 env[1111]: time="2024-02-12T19:48:38.421185790Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:48:39.148829 kubelet[1419]: E0212 19:48:39.148789 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:39.267806 systemd[1]: run-containerd-runc-k8s.io-cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8-runc.nTyzE8.mount: Deactivated successfully. Feb 12 19:48:39.854263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2254125781.mount: Deactivated successfully. Feb 12 19:48:40.109412 systemd-networkd[1011]: cali17a2bac3c4f: Gained IPv6LL Feb 12 19:48:40.149623 kubelet[1419]: E0212 19:48:40.149568 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:40.188898 env[1111]: time="2024-02-12T19:48:40.188825289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:40.190566 env[1111]: time="2024-02-12T19:48:40.190533901Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:40.192157 env[1111]: time="2024-02-12T19:48:40.192117204Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:40.193491 env[1111]: time="2024-02-12T19:48:40.193462074Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:40.193876 env[1111]: time="2024-02-12T19:48:40.193847097Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:48:40.195139 env[1111]: time="2024-02-12T19:48:40.195111293Z" level=info msg="CreateContainer within sandbox \"cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:48:40.206601 env[1111]: time="2024-02-12T19:48:40.206552590Z" level=info msg="CreateContainer within sandbox \"cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5c7d48b5c83f08c2bdc7381ecc6b114f863aafd25f07da55c5123e632c3817e1\"" Feb 12 19:48:40.207047 env[1111]: time="2024-02-12T19:48:40.206993920Z" level=info msg="StartContainer for \"5c7d48b5c83f08c2bdc7381ecc6b114f863aafd25f07da55c5123e632c3817e1\"" Feb 12 19:48:40.220409 systemd[1]: Started cri-containerd-5c7d48b5c83f08c2bdc7381ecc6b114f863aafd25f07da55c5123e632c3817e1.scope. Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd515675e58 items=0 ppid=2391 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376434386235633833663038633262646337333831656363366231 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit: BPF prog-id=95 op=LOAD Feb 12 19:48:40.231000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003820e8 items=0 ppid=2391 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376434386235633833663038633262646337333831656363366231 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit: BPF prog-id=96 op=LOAD Feb 12 19:48:40.231000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000382138 items=0 ppid=2391 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376434386235633833663038633262646337333831656363366231 Feb 12 19:48:40.231000 audit: BPF prog-id=96 op=UNLOAD Feb 12 19:48:40.231000 audit: BPF prog-id=95 op=UNLOAD Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:40.231000 audit: BPF prog-id=97 op=LOAD Feb 12 19:48:40.231000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003821c8 items=0 ppid=2391 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:40.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376434386235633833663038633262646337333831656363366231 Feb 12 19:48:40.243728 env[1111]: time="2024-02-12T19:48:40.243676479Z" level=info msg="StartContainer for \"5c7d48b5c83f08c2bdc7381ecc6b114f863aafd25f07da55c5123e632c3817e1\" returns successfully" Feb 12 19:48:40.244786 env[1111]: time="2024-02-12T19:48:40.244766314Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:48:41.150034 kubelet[1419]: E0212 19:48:41.149998 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:42.013310 env[1111]: time="2024-02-12T19:48:42.013250888Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:42.014822 env[1111]: time="2024-02-12T19:48:42.014787167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:42.016161 env[1111]: time="2024-02-12T19:48:42.016120209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:42.017517 env[1111]: time="2024-02-12T19:48:42.017477558Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:42.017832 env[1111]: time="2024-02-12T19:48:42.017789801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:48:42.019663 env[1111]: time="2024-02-12T19:48:42.019629276Z" level=info msg="CreateContainer within sandbox \"cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:48:42.031478 env[1111]: time="2024-02-12T19:48:42.031444514Z" level=info msg="CreateContainer within sandbox \"cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"7a951cced8b7356d48643e6278e02adfae9721fbe0ca2af9ef1c171f5bc99779\"" Feb 12 19:48:42.031757 env[1111]: time="2024-02-12T19:48:42.031734565Z" level=info msg="StartContainer for \"7a951cced8b7356d48643e6278e02adfae9721fbe0ca2af9ef1c171f5bc99779\"" Feb 12 19:48:42.046135 systemd[1]: Started cri-containerd-7a951cced8b7356d48643e6278e02adfae9721fbe0ca2af9ef1c171f5bc99779.scope. Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f6311666858 items=0 ppid=2391 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:42.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393531636365643862373335366434383634336536323738653032 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit: BPF prog-id=98 op=LOAD Feb 12 19:48:42.056000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032fbd8 items=0 ppid=2391 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:42.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393531636365643862373335366434383634336536323738653032 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit: BPF prog-id=99 op=LOAD Feb 12 19:48:42.056000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032fc28 items=0 ppid=2391 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:42.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393531636365643862373335366434383634336536323738653032 Feb 12 19:48:42.056000 audit: BPF prog-id=99 op=UNLOAD Feb 12 19:48:42.056000 audit: BPF prog-id=98 op=UNLOAD Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:42.056000 audit: BPF prog-id=100 op=LOAD Feb 12 19:48:42.056000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032fcb8 items=0 ppid=2391 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:42.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393531636365643862373335366434383634336536323738653032 Feb 12 19:48:42.068564 env[1111]: time="2024-02-12T19:48:42.068525665Z" level=info msg="StartContainer for \"7a951cced8b7356d48643e6278e02adfae9721fbe0ca2af9ef1c171f5bc99779\" returns successfully" Feb 12 19:48:42.151080 kubelet[1419]: E0212 19:48:42.151050 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:42.190344 kubelet[1419]: I0212 19:48:42.190325 1419 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:48:42.190426 kubelet[1419]: I0212 19:48:42.190352 1419 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:48:42.272635 kubelet[1419]: I0212 19:48:42.272518 1419 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-sjfgx" podStartSLOduration=27.67486374 podCreationTimestamp="2024-02-12 19:48:11 +0000 UTC" firstStartedPulling="2024-02-12 19:48:38.420770968 +0000 UTC m=+28.632227050" lastFinishedPulling="2024-02-12 19:48:42.018385914 +0000 UTC m=+32.229842006" observedRunningTime="2024-02-12 19:48:42.271707341 +0000 UTC m=+32.483163453" watchObservedRunningTime="2024-02-12 19:48:42.272478696 +0000 UTC m=+32.483934788" Feb 12 19:48:43.151788 kubelet[1419]: E0212 19:48:43.151740 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:43.207917 env[1111]: time="2024-02-12T19:48:43.207875070Z" level=info msg="StopPodSandbox for \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\"" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.239 [INFO][2520] k8s.go 578: Cleaning up netns ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.240 [INFO][2520] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" iface="eth0" netns="/var/run/netns/cni-c78ce273-4e54-fadb-679b-1f9123a1e4ac" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.240 [INFO][2520] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" iface="eth0" netns="/var/run/netns/cni-c78ce273-4e54-fadb-679b-1f9123a1e4ac" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.240 [INFO][2520] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" iface="eth0" netns="/var/run/netns/cni-c78ce273-4e54-fadb-679b-1f9123a1e4ac" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.240 [INFO][2520] k8s.go 585: Releasing IP address(es) ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.240 [INFO][2520] utils.go 188: Calico CNI releasing IP address ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.255 [INFO][2528] ipam_plugin.go 415: Releasing address using handleID ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.255 [INFO][2528] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.255 [INFO][2528] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.261 [WARNING][2528] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.261 [INFO][2528] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.262 [INFO][2528] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:43.265117 env[1111]: 2024-02-12 19:48:43.263 [INFO][2520] k8s.go 591: Teardown processing complete. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:48:43.267309 env[1111]: time="2024-02-12T19:48:43.265338315Z" level=info msg="TearDown network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\" successfully" Feb 12 19:48:43.267309 env[1111]: time="2024-02-12T19:48:43.267108897Z" level=info msg="StopPodSandbox for \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\" returns successfully" Feb 12 19:48:43.266548 systemd[1]: run-netns-cni\x2dc78ce273\x2d4e54\x2dfadb\x2d679b\x2d1f9123a1e4ac.mount: Deactivated successfully. Feb 12 19:48:43.272010 env[1111]: time="2024-02-12T19:48:43.271968531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-fpdg6,Uid:579e955c-0c83-41fb-851a-13a7af45b100,Namespace:default,Attempt:1,}" Feb 12 19:48:43.357206 systemd-networkd[1011]: cali03668f8adf5: Link UP Feb 12 19:48:43.358421 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:48:43.358456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali03668f8adf5: link becomes ready Feb 12 19:48:43.358556 systemd-networkd[1011]: cali03668f8adf5: Gained carrier Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.307 [INFO][2536] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0 nginx-deployment-6d5f899847- default 579e955c-0c83-41fb-851a-13a7af45b100 941 0 2024-02-12 19:48:29 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 nginx-deployment-6d5f899847-fpdg6 eth0 default [] [] [kns.default ksa.default.default] cali03668f8adf5 [] []}} ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Namespace="default" Pod="nginx-deployment-6d5f899847-fpdg6" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.307 [INFO][2536] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Namespace="default" Pod="nginx-deployment-6d5f899847-fpdg6" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.327 [INFO][2551] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" HandleID="k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.336 [INFO][2551] ipam_plugin.go 268: Auto assigning IP ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" HandleID="k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029fb30), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nginx-deployment-6d5f899847-fpdg6", "timestamp":"2024-02-12 19:48:43.327630458 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.336 [INFO][2551] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.336 [INFO][2551] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.336 [INFO][2551] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.338 [INFO][2551] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.341 [INFO][2551] ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.344 [INFO][2551] ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.345 [INFO][2551] ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.347 [INFO][2551] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.347 [INFO][2551] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.348 [INFO][2551] ipam.go 1682: Creating new handle: k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129 Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.351 [INFO][2551] ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.354 [INFO][2551] ipam.go 1216: Successfully claimed IPs: [192.168.66.2/26] block=192.168.66.0/26 handle="k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.354 [INFO][2551] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.2/26] handle="k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" host="10.0.0.143" Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.354 [INFO][2551] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:43.364506 env[1111]: 2024-02-12 19:48:43.354 [INFO][2551] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.66.2/26] IPv6=[] ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" HandleID="k8s-pod-network.34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.365064 env[1111]: 2024-02-12 19:48:43.355 [INFO][2536] k8s.go 385: Populated endpoint ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Namespace="default" Pod="nginx-deployment-6d5f899847-fpdg6" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"579e955c-0c83-41fb-851a-13a7af45b100", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nginx-deployment-6d5f899847-fpdg6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali03668f8adf5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:43.365064 env[1111]: 2024-02-12 19:48:43.355 [INFO][2536] k8s.go 386: Calico CNI using IPs: [192.168.66.2/32] ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Namespace="default" Pod="nginx-deployment-6d5f899847-fpdg6" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.365064 env[1111]: 2024-02-12 19:48:43.355 [INFO][2536] dataplane_linux.go 68: Setting the host side veth name to cali03668f8adf5 ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Namespace="default" Pod="nginx-deployment-6d5f899847-fpdg6" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.365064 env[1111]: 2024-02-12 19:48:43.358 [INFO][2536] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Namespace="default" Pod="nginx-deployment-6d5f899847-fpdg6" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.365064 env[1111]: 2024-02-12 19:48:43.358 [INFO][2536] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Namespace="default" Pod="nginx-deployment-6d5f899847-fpdg6" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"579e955c-0c83-41fb-851a-13a7af45b100", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129", Pod:"nginx-deployment-6d5f899847-fpdg6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali03668f8adf5", MAC:"1e:1a:62:65:1a:00", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:43.365064 env[1111]: 2024-02-12 19:48:43.362 [INFO][2536] k8s.go 491: Wrote updated endpoint to datastore ContainerID="34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129" Namespace="default" Pod="nginx-deployment-6d5f899847-fpdg6" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:48:43.373000 audit[2576]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:43.373000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffe17ed57e0 a2=0 a3=7ffe17ed57cc items=0 ppid=2090 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.373000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:43.378661 env[1111]: time="2024-02-12T19:48:43.378594746Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:43.378661 env[1111]: time="2024-02-12T19:48:43.378636615Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:43.378661 env[1111]: time="2024-02-12T19:48:43.378647315Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:43.378813 env[1111]: time="2024-02-12T19:48:43.378765871Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129 pid=2584 runtime=io.containerd.runc.v2 Feb 12 19:48:43.395467 systemd[1]: Started cri-containerd-34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129.scope. Feb 12 19:48:43.413106 kernel: kauditd_printk_skb: 139 callbacks suppressed Feb 12 19:48:43.413186 kernel: audit: type=1400 audit(1707767323.405:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.413206 kernel: audit: type=1400 audit(1707767323.405:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.413220 kernel: audit: type=1400 audit(1707767323.405:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.413237 kernel: audit: type=1400 audit(1707767323.405:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.415019 kernel: audit: type=1400 audit(1707767323.405:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.417424 systemd-resolved[1058]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:48:43.418929 kernel: audit: type=1400 audit(1707767323.405:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.418951 kernel: audit: type=1400 audit(1707767323.405:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.422810 kernel: audit: type=1400 audit(1707767323.405:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.422848 kernel: audit: type=1400 audit(1707767323.405:744): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.424726 kernel: audit: type=1400 audit(1707767323.407:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.407000 audit: BPF prog-id=101 op=LOAD Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334313535666538396663633631393361643932326135303663633733 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334313535666538396663633631393361643932326135303663633733 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.408000 audit: BPF prog-id=102 op=LOAD Feb 12 19:48:43.408000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00025fce0 items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334313535666538396663633631393361643932326135303663633733 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.409000 audit: BPF prog-id=103 op=LOAD Feb 12 19:48:43.409000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00025fd28 items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334313535666538396663633631393361643932326135303663633733 Feb 12 19:48:43.411000 audit: BPF prog-id=103 op=UNLOAD Feb 12 19:48:43.411000 audit: BPF prog-id=102 op=UNLOAD Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.411000 audit: BPF prog-id=104 op=LOAD Feb 12 19:48:43.411000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000360138 items=0 ppid=2584 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334313535666538396663633631393361643932326135303663633733 Feb 12 19:48:43.443796 env[1111]: time="2024-02-12T19:48:43.443760623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-fpdg6,Uid:579e955c-0c83-41fb-851a-13a7af45b100,Namespace:default,Attempt:1,} returns sandbox id \"34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129\"" Feb 12 19:48:43.445456 env[1111]: time="2024-02-12T19:48:43.445419522Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:48:43.463131 update_engine[1101]: I0212 19:48:43.463093 1101 update_attempter.cc:509] Updating boot flags... Feb 12 19:48:44.152489 kubelet[1419]: E0212 19:48:44.152438 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:44.266659 systemd[1]: run-containerd-runc-k8s.io-34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129-runc.l5KYz4.mount: Deactivated successfully. Feb 12 19:48:45.152949 kubelet[1419]: E0212 19:48:45.152904 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:45.421405 systemd-networkd[1011]: cali03668f8adf5: Gained IPv6LL Feb 12 19:48:46.153473 kubelet[1419]: E0212 19:48:46.153431 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:46.397298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1862625672.mount: Deactivated successfully. Feb 12 19:48:47.154442 kubelet[1419]: E0212 19:48:47.154392 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:47.684981 env[1111]: time="2024-02-12T19:48:47.684939468Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:47.686447 env[1111]: time="2024-02-12T19:48:47.686421193Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:47.687815 env[1111]: time="2024-02-12T19:48:47.687767752Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:47.689055 env[1111]: time="2024-02-12T19:48:47.689029631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:47.689557 env[1111]: time="2024-02-12T19:48:47.689531410Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 19:48:47.690769 env[1111]: time="2024-02-12T19:48:47.690740890Z" level=info msg="CreateContainer within sandbox \"34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 19:48:47.699730 env[1111]: time="2024-02-12T19:48:47.699698087Z" level=info msg="CreateContainer within sandbox \"34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3d4adbfdfc83f53fa81a17b8bf75988c2ebe2769e8dc113b39ec0639d23e14f6\"" Feb 12 19:48:47.700123 env[1111]: time="2024-02-12T19:48:47.700089537Z" level=info msg="StartContainer for \"3d4adbfdfc83f53fa81a17b8bf75988c2ebe2769e8dc113b39ec0639d23e14f6\"" Feb 12 19:48:47.717410 systemd[1]: Started cri-containerd-3d4adbfdfc83f53fa81a17b8bf75988c2ebe2769e8dc113b39ec0639d23e14f6.scope. Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit: BPF prog-id=105 op=LOAD Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2584 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:47.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346164626664666338336635336661383161313762386266373539 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2584 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:47.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346164626664666338336635336661383161313762386266373539 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit: BPF prog-id=106 op=LOAD Feb 12 19:48:47.723000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000215730 items=0 ppid=2584 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:47.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346164626664666338336635336661383161313762386266373539 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.723000 audit: BPF prog-id=107 op=LOAD Feb 12 19:48:47.723000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000215778 items=0 ppid=2584 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:47.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346164626664666338336635336661383161313762386266373539 Feb 12 19:48:47.724000 audit: BPF prog-id=107 op=UNLOAD Feb 12 19:48:47.724000 audit: BPF prog-id=106 op=UNLOAD Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:47.724000 audit: BPF prog-id=108 op=LOAD Feb 12 19:48:47.724000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000215b88 items=0 ppid=2584 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:47.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364346164626664666338336635336661383161313762386266373539 Feb 12 19:48:47.902772 env[1111]: time="2024-02-12T19:48:47.902711898Z" level=info msg="StartContainer for \"3d4adbfdfc83f53fa81a17b8bf75988c2ebe2769e8dc113b39ec0639d23e14f6\" returns successfully" Feb 12 19:48:48.155284 kubelet[1419]: E0212 19:48:48.155227 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:48.287006 kubelet[1419]: I0212 19:48:48.286974 1419 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-fpdg6" podStartSLOduration=15.042172026 podCreationTimestamp="2024-02-12 19:48:29 +0000 UTC" firstStartedPulling="2024-02-12 19:48:43.444972394 +0000 UTC m=+33.656428486" lastFinishedPulling="2024-02-12 19:48:47.68974267 +0000 UTC m=+37.901198762" observedRunningTime="2024-02-12 19:48:48.286684555 +0000 UTC m=+38.498140637" watchObservedRunningTime="2024-02-12 19:48:48.286942302 +0000 UTC m=+38.498398394" Feb 12 19:48:49.155729 kubelet[1419]: E0212 19:48:49.155696 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:50.131009 kubelet[1419]: E0212 19:48:50.130984 1419 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:50.156177 kubelet[1419]: E0212 19:48:50.156151 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:51.105000 audit[2697]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.109613 kernel: kauditd_printk_skb: 104 callbacks suppressed Feb 12 19:48:51.109665 kernel: audit: type=1325 audit(1707767331.105:772): table=filter:79 family=2 entries=20 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.109691 kernel: audit: type=1300 audit(1707767331.105:772): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffec0e9c510 a2=0 a3=7ffec0e9c4fc items=0 ppid=1657 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.105000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffec0e9c510 a2=0 a3=7ffec0e9c4fc items=0 ppid=1657 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.114290 kernel: audit: type=1327 audit(1707767331.105:772): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.106000 audit[2697]: NETFILTER_CFG table=nat:80 family=2 entries=20 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.116024 kernel: audit: type=1325 audit(1707767331.106:773): table=nat:80 family=2 entries=20 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.116154 kernel: audit: type=1300 audit(1707767331.106:773): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffec0e9c510 a2=0 a3=31030 items=0 ppid=1657 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.106000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffec0e9c510 a2=0 a3=31030 items=0 ppid=1657 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.106000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.120582 kernel: audit: type=1327 audit(1707767331.106:773): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.118000 audit[2699]: NETFILTER_CFG table=filter:81 family=2 entries=32 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.118000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd6b49d5c0 a2=0 a3=7ffd6b49d5ac items=0 ppid=1657 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.126285 kernel: audit: type=1325 audit(1707767331.118:774): table=filter:81 family=2 entries=32 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.126351 kernel: audit: type=1300 audit(1707767331.118:774): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd6b49d5c0 a2=0 a3=7ffd6b49d5ac items=0 ppid=1657 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.126369 kernel: audit: type=1327 audit(1707767331.118:774): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.131603 kubelet[1419]: I0212 19:48:51.131569 1419 topology_manager.go:215] "Topology Admit Handler" podUID="f8eefaae-dedf-4aa5-a1c1-76a94a3a3352" podNamespace="default" podName="nfs-server-provisioner-0" Feb 12 19:48:51.120000 audit[2699]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.120000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd6b49d5c0 a2=0 a3=31030 items=0 ppid=1657 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.135360 kernel: audit: type=1325 audit(1707767331.120:775): table=nat:82 family=2 entries=20 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:51.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:51.136282 systemd[1]: Created slice kubepods-besteffort-podf8eefaae_dedf_4aa5_a1c1_76a94a3a3352.slice. Feb 12 19:48:51.156557 kubelet[1419]: E0212 19:48:51.156520 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:51.236357 kubelet[1419]: I0212 19:48:51.236302 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f8eefaae-dedf-4aa5-a1c1-76a94a3a3352-data\") pod \"nfs-server-provisioner-0\" (UID: \"f8eefaae-dedf-4aa5-a1c1-76a94a3a3352\") " pod="default/nfs-server-provisioner-0" Feb 12 19:48:51.236357 kubelet[1419]: I0212 19:48:51.236361 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nrg7q\" (UniqueName: \"kubernetes.io/projected/f8eefaae-dedf-4aa5-a1c1-76a94a3a3352-kube-api-access-nrg7q\") pod \"nfs-server-provisioner-0\" (UID: \"f8eefaae-dedf-4aa5-a1c1-76a94a3a3352\") " pod="default/nfs-server-provisioner-0" Feb 12 19:48:51.439165 env[1111]: time="2024-02-12T19:48:51.439112551Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f8eefaae-dedf-4aa5-a1c1-76a94a3a3352,Namespace:default,Attempt:0,}" Feb 12 19:48:51.532697 systemd-networkd[1011]: cali60e51b789ff: Link UP Feb 12 19:48:51.534185 systemd-networkd[1011]: cali60e51b789ff: Gained carrier Feb 12 19:48:51.534331 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:48:51.534377 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.481 [INFO][2701] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f8eefaae-dedf-4aa5-a1c1-76a94a3a3352 988 0 2024-02-12 19:48:51 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.143 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.481 [INFO][2701] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.502 [INFO][2716] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" HandleID="k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.511 [INFO][2716] ipam_plugin.go 268: Auto assigning IP ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" HandleID="k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00052d600), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 19:48:51.502413402 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.511 [INFO][2716] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.511 [INFO][2716] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.511 [INFO][2716] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.512 [INFO][2716] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.516 [INFO][2716] ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.519 [INFO][2716] ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.520 [INFO][2716] ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.522 [INFO][2716] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.522 [INFO][2716] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.523 [INFO][2716] ipam.go 1682: Creating new handle: k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.526 [INFO][2716] ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.529 [INFO][2716] ipam.go 1216: Successfully claimed IPs: [192.168.66.3/26] block=192.168.66.0/26 handle="k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.529 [INFO][2716] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.3/26] handle="k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" host="10.0.0.143" Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.529 [INFO][2716] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:48:51.542675 env[1111]: 2024-02-12 19:48:51.529 [INFO][2716] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.66.3/26] IPv6=[] ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" HandleID="k8s-pod-network.7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:48:51.543769 env[1111]: 2024-02-12 19:48:51.530 [INFO][2701] k8s.go 385: Populated endpoint ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f8eefaae-dedf-4aa5-a1c1-76a94a3a3352", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:51.543769 env[1111]: 2024-02-12 19:48:51.530 [INFO][2701] k8s.go 386: Calico CNI using IPs: [192.168.66.3/32] ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:48:51.543769 env[1111]: 2024-02-12 19:48:51.531 [INFO][2701] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:48:51.543769 env[1111]: 2024-02-12 19:48:51.534 [INFO][2701] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:48:51.543978 env[1111]: 2024-02-12 19:48:51.534 [INFO][2701] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f8eefaae-dedf-4aa5-a1c1-76a94a3a3352", ResourceVersion:"988", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"2a:e4:aa:94:6d:2e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:48:51.543978 env[1111]: 2024-02-12 19:48:51.540 [INFO][2701] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:48:51.553000 audit[2741]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:51.553000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffc84419210 a2=0 a3=7ffc844191fc items=0 ppid=2090 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.553000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:51.556379 env[1111]: time="2024-02-12T19:48:51.556306263Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:51.556379 env[1111]: time="2024-02-12T19:48:51.556357470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:51.556379 env[1111]: time="2024-02-12T19:48:51.556378419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:51.556619 env[1111]: time="2024-02-12T19:48:51.556582094Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b pid=2748 runtime=io.containerd.runc.v2 Feb 12 19:48:51.570022 systemd[1]: Started cri-containerd-7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b.scope. Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.578000 audit: BPF prog-id=109 op=LOAD Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2748 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763303261656635336164306338393764613638623231323337313735 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2748 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763303261656635336164306338393764613638623231323337313735 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit: BPF prog-id=110 op=LOAD Feb 12 19:48:51.579000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032c790 items=0 ppid=2748 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763303261656635336164306338393764613638623231323337313735 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit: BPF prog-id=111 op=LOAD Feb 12 19:48:51.579000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032c7d8 items=0 ppid=2748 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763303261656635336164306338393764613638623231323337313735 Feb 12 19:48:51.579000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:48:51.579000 audit: BPF prog-id=110 op=UNLOAD Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:51.579000 audit: BPF prog-id=112 op=LOAD Feb 12 19:48:51.579000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032cbe8 items=0 ppid=2748 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763303261656635336164306338393764613638623231323337313735 Feb 12 19:48:51.581174 systemd-resolved[1058]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:48:51.600233 env[1111]: time="2024-02-12T19:48:51.600179355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f8eefaae-dedf-4aa5-a1c1-76a94a3a3352,Namespace:default,Attempt:0,} returns sandbox id \"7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b\"" Feb 12 19:48:51.601450 env[1111]: time="2024-02-12T19:48:51.601365316Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 19:48:52.157317 kubelet[1419]: E0212 19:48:52.157249 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:52.345360 systemd[1]: run-containerd-runc-k8s.io-7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b-runc.sRljwA.mount: Deactivated successfully. Feb 12 19:48:53.037430 systemd-networkd[1011]: cali60e51b789ff: Gained IPv6LL Feb 12 19:48:53.157902 kubelet[1419]: E0212 19:48:53.157869 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:53.765725 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2556546127.mount: Deactivated successfully. Feb 12 19:48:54.158503 kubelet[1419]: E0212 19:48:54.158469 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:55.159510 kubelet[1419]: E0212 19:48:55.159471 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:56.080301 env[1111]: time="2024-02-12T19:48:56.080247090Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:56.081789 env[1111]: time="2024-02-12T19:48:56.081740856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:56.083528 env[1111]: time="2024-02-12T19:48:56.083503719Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:56.084969 env[1111]: time="2024-02-12T19:48:56.084925159Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:56.085441 env[1111]: time="2024-02-12T19:48:56.085409642Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 19:48:56.088617 env[1111]: time="2024-02-12T19:48:56.088592763Z" level=info msg="CreateContainer within sandbox \"7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 19:48:56.096955 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1674921396.mount: Deactivated successfully. Feb 12 19:48:56.102547 env[1111]: time="2024-02-12T19:48:56.102504086Z" level=info msg="CreateContainer within sandbox \"7c02aef53ad0c897da68b212371753b517b79c0525bb160d442e4ba6c1a7412b\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"c6043508a24483885805e767dad2c241de0d7a31247e1818e33a55c7779ab583\"" Feb 12 19:48:56.102972 env[1111]: time="2024-02-12T19:48:56.102946110Z" level=info msg="StartContainer for \"c6043508a24483885805e767dad2c241de0d7a31247e1818e33a55c7779ab583\"" Feb 12 19:48:56.117288 systemd[1]: Started cri-containerd-c6043508a24483885805e767dad2c241de0d7a31247e1818e33a55c7779ab583.scope. Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.127791 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 19:48:56.127836 kernel: audit: type=1400 audit(1707767336.126:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.131615 kernel: audit: type=1400 audit(1707767336.126:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.131676 kernel: audit: type=1400 audit(1707767336.126:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.133538 kernel: audit: type=1400 audit(1707767336.126:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135502 kernel: audit: type=1400 audit(1707767336.126:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.139394 kernel: audit: type=1400 audit(1707767336.126:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.139434 kernel: audit: type=1400 audit(1707767336.126:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.143296 kernel: audit: type=1400 audit(1707767336.126:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.143319 kernel: audit: type=1400 audit(1707767336.126:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.147142 kernel: audit: type=1400 audit(1707767336.129:804): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit: BPF prog-id=113 op=LOAD Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2748 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303433353038613234343833383835383035653736376461643263 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2748 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303433353038613234343833383835383035653736376461643263 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.129000 audit: BPF prog-id=114 op=LOAD Feb 12 19:48:56.129000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00023bbc0 items=0 ppid=2748 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303433353038613234343833383835383035653736376461643263 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.135000 audit: BPF prog-id=115 op=LOAD Feb 12 19:48:56.135000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00023bc08 items=0 ppid=2748 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303433353038613234343833383835383035653736376461643263 Feb 12 19:48:56.137000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:48:56.137000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.137000 audit: BPF prog-id=116 op=LOAD Feb 12 19:48:56.137000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000396018 items=0 ppid=2748 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303433353038613234343833383835383035653736376461643263 Feb 12 19:48:56.156404 env[1111]: time="2024-02-12T19:48:56.156202463Z" level=info msg="StartContainer for \"c6043508a24483885805e767dad2c241de0d7a31247e1818e33a55c7779ab583\" returns successfully" Feb 12 19:48:56.159577 kubelet[1419]: E0212 19:48:56.159549 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:56.194000 audit[2827]: AVC avc: denied { search } for pid=2827 comm="rpcbind" name="crypto" dev="proc" ino=21353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:48:56.194000 audit[2827]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5e64a4c0c0 a2=0 a3=0 items=0 ppid=2810 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 key=(null) Feb 12 19:48:56.194000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 19:48:56.223000 audit[2832]: AVC avc: denied { search } for pid=2832 comm="dbus-daemon" name="crypto" dev="proc" ino=21353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:48:56.223000 audit[2832]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f7bd4dfa0c0 a2=0 a3=0 items=0 ppid=2810 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 key=(null) Feb 12 19:48:56.223000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:48:56.226000 audit[2833]: AVC avc: denied { watch } for pid=2833 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c642,c790 tclass=dir permissive=0 Feb 12 19:48:56.226000 audit[2833]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55aeacc2e7e0 a2=2c8 a3=7ffe4342cacc items=0 ppid=2810 pid=2833 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 key=(null) Feb 12 19:48:56.226000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:48:56.228000 audit[2834]: AVC avc: denied { read } for pid=2834 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24627 scontext=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 19:48:56.228000 audit[2834]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7ff9d3846320 a1=80000 a2=d a3=7ffea287e370 items=0 ppid=2810 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 key=(null) Feb 12 19:48:56.228000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:48:56.229000 audit[2834]: AVC avc: denied { search } for pid=2834 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21353 scontext=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:48:56.229000 audit[2834]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff9d2d9a0c0 a2=0 a3=0 items=0 ppid=2810 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c642,c790 key=(null) Feb 12 19:48:56.229000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:48:56.303618 kubelet[1419]: I0212 19:48:56.303585 1419 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=0.819116395 podCreationTimestamp="2024-02-12 19:48:51 +0000 UTC" firstStartedPulling="2024-02-12 19:48:51.601186638 +0000 UTC m=+41.812642730" lastFinishedPulling="2024-02-12 19:48:56.085624608 +0000 UTC m=+46.297080700" observedRunningTime="2024-02-12 19:48:56.303117622 +0000 UTC m=+46.514573714" watchObservedRunningTime="2024-02-12 19:48:56.303554365 +0000 UTC m=+46.515010457" Feb 12 19:48:56.312000 audit[2852]: NETFILTER_CFG table=filter:84 family=2 entries=20 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:56.312000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc3aa9d520 a2=0 a3=7ffc3aa9d50c items=0 ppid=1657 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:56.315000 audit[2852]: NETFILTER_CFG table=nat:85 family=2 entries=104 op=nft_register_chain pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:56.315000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffc3aa9d520 a2=0 a3=7ffc3aa9d50c items=0 ppid=1657 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:57.160405 kubelet[1419]: E0212 19:48:57.160380 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:58.161371 kubelet[1419]: E0212 19:48:58.161342 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:59.161814 kubelet[1419]: E0212 19:48:59.161781 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:00.162178 kubelet[1419]: E0212 19:49:00.162146 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:01.163187 kubelet[1419]: E0212 19:49:01.163149 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:02.164169 kubelet[1419]: E0212 19:49:02.164130 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:03.165361 kubelet[1419]: E0212 19:49:03.165313 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:04.166187 kubelet[1419]: E0212 19:49:04.166159 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:05.166573 kubelet[1419]: E0212 19:49:05.166541 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:06.061126 kubelet[1419]: E0212 19:49:06.061095 1419 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Feb 12 19:49:06.166954 kubelet[1419]: E0212 19:49:06.166917 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:06.349768 kubelet[1419]: I0212 19:49:06.349706 1419 topology_manager.go:215] "Topology Admit Handler" podUID="9b2c7b14-5394-4c7e-9944-8923b25797d5" podNamespace="default" podName="test-pod-1" Feb 12 19:49:06.354179 systemd[1]: Created slice kubepods-besteffort-pod9b2c7b14_5394_4c7e_9944_8923b25797d5.slice. Feb 12 19:49:06.403529 kubelet[1419]: I0212 19:49:06.403487 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bxbtk\" (UniqueName: \"kubernetes.io/projected/9b2c7b14-5394-4c7e-9944-8923b25797d5-kube-api-access-bxbtk\") pod \"test-pod-1\" (UID: \"9b2c7b14-5394-4c7e-9944-8923b25797d5\") " pod="default/test-pod-1" Feb 12 19:49:06.403529 kubelet[1419]: I0212 19:49:06.403526 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-0114085d-398b-44f2-b499-d131c6a4bca6\" (UniqueName: \"kubernetes.io/nfs/9b2c7b14-5394-4c7e-9944-8923b25797d5-pvc-0114085d-398b-44f2-b499-d131c6a4bca6\") pod \"test-pod-1\" (UID: \"9b2c7b14-5394-4c7e-9944-8923b25797d5\") " pod="default/test-pod-1" Feb 12 19:49:06.512000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.514393 kernel: Failed to create system directory netfs Feb 12 19:49:06.514442 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 19:49:06.514460 kernel: audit: type=1400 audit(1707767346.512:820): avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.514480 kernel: Failed to create system directory netfs Feb 12 19:49:06.512000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.517120 kernel: audit: type=1400 audit(1707767346.512:820): avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.517156 kernel: Failed to create system directory netfs Feb 12 19:49:06.517605 kernel: audit: type=1400 audit(1707767346.512:820): avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.512000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.512000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.523291 kernel: Failed to create system directory netfs Feb 12 19:49:06.523326 kernel: audit: type=1400 audit(1707767346.512:820): avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.512000 audit[2888]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5621001f75e0 a1=153bc a2=5620ff4f92b0 a3=5 items=0 ppid=483 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.512000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:06.529936 kernel: audit: type=1300 audit(1707767346.512:820): arch=c000003e syscall=175 success=yes exit=0 a0=5621001f75e0 a1=153bc a2=5620ff4f92b0 a3=5 items=0 ppid=483 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.529968 kernel: audit: type=1327 audit(1707767346.512:820): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.532290 kernel: Failed to create system directory fscache Feb 12 19:49:06.532330 kernel: audit: type=1400 audit(1707767346.529:821): avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.532347 kernel: Failed to create system directory fscache Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.537122 kernel: audit: type=1400 audit(1707767346.529:821): avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.537158 kernel: Failed to create system directory fscache Feb 12 19:49:06.537174 kernel: audit: type=1400 audit(1707767346.529:821): avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.537625 kernel: Failed to create system directory fscache Feb 12 19:49:06.537660 kernel: Failed to create system directory fscache Feb 12 19:49:06.539865 kernel: audit: type=1400 audit(1707767346.529:821): avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.540363 kernel: Failed to create system directory fscache Feb 12 19:49:06.540384 kernel: Failed to create system directory fscache Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.544495 kernel: Failed to create system directory fscache Feb 12 19:49:06.544531 kernel: Failed to create system directory fscache Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.545519 kernel: Failed to create system directory fscache Feb 12 19:49:06.545547 kernel: Failed to create system directory fscache Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.546555 kernel: Failed to create system directory fscache Feb 12 19:49:06.546578 kernel: Failed to create system directory fscache Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.529000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.547550 kernel: Failed to create system directory fscache Feb 12 19:49:06.529000 audit[2888]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56210040c9c0 a1=4c0fc a2=5620ff4f92b0 a3=5 items=0 ppid=483 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.529000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:06.549296 kernel: FS-Cache: Loaded Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.574542 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.574587 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.574603 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.575571 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.575606 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.576594 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.576619 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.577622 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.577643 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.578647 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.578668 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.579668 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.579690 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.580693 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.580717 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.581715 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.581731 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.582732 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.582755 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.583762 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.583795 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.584293 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.585297 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.585319 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.586321 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.586337 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.587345 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.587366 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.588367 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.588384 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.589386 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.589403 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.590409 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.590434 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.591433 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.591454 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.592456 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.592473 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.593482 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.593519 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.594509 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.594540 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.595526 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.595550 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.596548 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.596569 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.597567 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.597585 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.598609 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.598627 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.599635 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.599652 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.601201 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.601244 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.602239 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.603293 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.603314 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.604312 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.604350 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.605339 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.605356 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.606363 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.606386 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.607385 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.607406 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.608403 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.608421 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.609428 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.609447 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.610449 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.610470 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.611469 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.611490 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.612488 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.612510 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.613521 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.613540 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.614548 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.614581 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.615565 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.615590 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.616587 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.616609 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.617606 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.617623 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.618625 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.618647 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.619648 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.619665 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.620667 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.620684 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.621686 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.621703 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.622738 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.622801 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.623749 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.623766 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.624770 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.624807 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.626304 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.626326 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.626339 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.627326 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.627343 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.628346 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.628369 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.629367 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.629384 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.630391 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.630412 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.631409 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.631425 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.632430 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.632446 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.633452 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.633478 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.634473 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.634500 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.635491 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.635513 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.636508 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.636529 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.637529 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.637557 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.638552 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.638573 kernel: Failed to create system directory sunrpc Feb 12 19:49:06.565000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.647375 kernel: RPC: Registered named UNIX socket transport module. Feb 12 19:49:06.647399 kernel: RPC: Registered udp transport module. Feb 12 19:49:06.647412 kernel: RPC: Registered tcp transport module. Feb 12 19:49:06.647424 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 19:49:06.565000 audit[2888]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562100458ad0 a1=1588c4 a2=5620ff4f92b0 a3=5 items=6 ppid=483 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.565000 audit: CWD cwd="/" Feb 12 19:49:06.565000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:06.565000 audit: PATH item=1 name=(null) inode=25648 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:06.565000 audit: PATH item=2 name=(null) inode=25648 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:06.565000 audit: PATH item=3 name=(null) inode=25649 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:06.565000 audit: PATH item=4 name=(null) inode=25648 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:06.565000 audit: PATH item=5 name=(null) inode=25650 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:06.565000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.672714 kernel: Failed to create system directory nfs Feb 12 19:49:06.672741 kernel: Failed to create system directory nfs Feb 12 19:49:06.672753 kernel: Failed to create system directory nfs Feb 12 19:49:06.672765 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.673684 kernel: Failed to create system directory nfs Feb 12 19:49:06.673705 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.674651 kernel: Failed to create system directory nfs Feb 12 19:49:06.674682 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.675623 kernel: Failed to create system directory nfs Feb 12 19:49:06.675649 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.676586 kernel: Failed to create system directory nfs Feb 12 19:49:06.676613 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.677560 kernel: Failed to create system directory nfs Feb 12 19:49:06.677589 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.678525 kernel: Failed to create system directory nfs Feb 12 19:49:06.678558 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.679492 kernel: Failed to create system directory nfs Feb 12 19:49:06.679521 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.680464 kernel: Failed to create system directory nfs Feb 12 19:49:06.680487 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.681435 kernel: Failed to create system directory nfs Feb 12 19:49:06.681464 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.682410 kernel: Failed to create system directory nfs Feb 12 19:49:06.682433 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.683376 kernel: Failed to create system directory nfs Feb 12 19:49:06.683403 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.684352 kernel: Failed to create system directory nfs Feb 12 19:49:06.684395 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.685314 kernel: Failed to create system directory nfs Feb 12 19:49:06.685335 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.686287 kernel: Failed to create system directory nfs Feb 12 19:49:06.686304 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.687742 kernel: Failed to create system directory nfs Feb 12 19:49:06.687766 kernel: Failed to create system directory nfs Feb 12 19:49:06.687778 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.688695 kernel: Failed to create system directory nfs Feb 12 19:49:06.688720 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.689672 kernel: Failed to create system directory nfs Feb 12 19:49:06.689689 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.690665 kernel: Failed to create system directory nfs Feb 12 19:49:06.690699 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.691621 kernel: Failed to create system directory nfs Feb 12 19:49:06.691652 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.692592 kernel: Failed to create system directory nfs Feb 12 19:49:06.692671 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.693566 kernel: Failed to create system directory nfs Feb 12 19:49:06.693583 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.694540 kernel: Failed to create system directory nfs Feb 12 19:49:06.694562 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.695513 kernel: Failed to create system directory nfs Feb 12 19:49:06.695534 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.696482 kernel: Failed to create system directory nfs Feb 12 19:49:06.696499 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.697452 kernel: Failed to create system directory nfs Feb 12 19:49:06.697473 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.698425 kernel: Failed to create system directory nfs Feb 12 19:49:06.698442 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.699392 kernel: Failed to create system directory nfs Feb 12 19:49:06.699409 kernel: Failed to create system directory nfs Feb 12 19:49:06.665000 audit[2888]: AVC avc: denied { confidentiality } for pid=2888 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.712352 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 19:49:06.665000 audit[2888]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5621005fb680 a1=e29dc a2=5620ff4f92b0 a3=5 items=0 ppid=483 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.665000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.744697 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.744729 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.744746 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.744759 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.745645 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.745662 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.746607 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.746624 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.747562 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.747583 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.748526 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.748542 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.749476 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.749498 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.750435 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.750456 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.751391 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.751412 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.752339 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.752359 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.753294 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.753310 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.754290 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.754309 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.755693 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.755712 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.755725 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.756637 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.756655 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.757590 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.757608 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.758542 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.758560 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.759489 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.759506 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.760441 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.760463 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.761393 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.761410 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.762338 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.762356 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.763294 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.763322 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.764736 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.764755 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.764775 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.765699 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.765720 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.766648 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.766665 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.767601 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.767619 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.768554 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.768571 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.769503 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.769520 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.770458 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.770475 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.771410 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.771427 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.772359 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.772376 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.773307 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.773334 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.774729 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.774754 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.774767 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.775676 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.775698 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.776643 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.776661 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.777603 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.777621 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.778550 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.778567 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.779498 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.779515 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.780444 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.780461 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.781402 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.781425 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.782393 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.782410 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.783355 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.783433 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.784304 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.784342 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.785712 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.785733 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.785748 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.786671 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.786699 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.787632 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.787650 kernel: Failed to create system directory nfs4 Feb 12 19:49:06.734000 audit[2893]: AVC avc: denied { confidentiality } for pid=2893 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.927341 kernel: NFS: Registering the id_resolver key type Feb 12 19:49:06.927412 kernel: Key type id_resolver registered Feb 12 19:49:06.927427 kernel: Key type id_legacy registered Feb 12 19:49:06.734000 audit[2893]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fae27d38010 a1=1d3cc4 a2=561ec010f2b0 a3=5 items=0 ppid=483 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.734000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.936776 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.936803 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.936831 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.936844 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.938320 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.938338 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.938351 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.939355 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.939374 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.940380 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.940398 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.941403 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.941420 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.942430 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.942457 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.943449 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.943476 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.944474 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.944495 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.945492 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.945509 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.946511 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.946529 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.947529 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.947547 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.933000 audit[2894]: AVC avc: denied { confidentiality } for pid=2894 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:06.948545 kernel: Failed to create system directory rpcgss Feb 12 19:49:06.933000 audit[2894]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f77d5211010 a1=4f524 a2=5617270122b0 a3=5 items=0 ppid=483 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.933000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 19:49:06.959032 nfsidmap[2903]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 12 19:49:06.961337 nfsidmap[2906]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Feb 12 19:49:06.969000 audit[1171]: AVC avc: denied { watch_reads } for pid=1171 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:06.969000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:06.969000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:06.969000 audit[1171]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c2b7513a0 a2=10 a3=a10bdafd5f0c9eec items=0 ppid=1 pid=1171 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.969000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:49:06.969000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:06.969000 audit[1171]: AVC avc: denied { watch_reads } for pid=1171 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:06.969000 audit[1171]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c2b7513a0 a2=10 a3=a10bdafd5f0c9eec items=0 ppid=1 pid=1171 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.969000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:49:06.969000 audit[1171]: AVC avc: denied { watch_reads } for pid=1171 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:06.969000 audit[1171]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c2b7513a0 a2=10 a3=a10bdafd5f0c9eec items=0 ppid=1 pid=1171 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:06.969000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:49:07.167372 kubelet[1419]: E0212 19:49:07.167313 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:07.256557 env[1111]: time="2024-02-12T19:49:07.256478274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9b2c7b14-5394-4c7e-9944-8923b25797d5,Namespace:default,Attempt:0,}" Feb 12 19:49:07.345081 systemd-networkd[1011]: cali5ec59c6bf6e: Link UP Feb 12 19:49:07.346712 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:49:07.346807 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 19:49:07.346796 systemd-networkd[1011]: cali5ec59c6bf6e: Gained carrier Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.295 [INFO][2909] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-test--pod--1-eth0 default 9b2c7b14-5394-4c7e-9944-8923b25797d5 1054 0 2024-02-12 19:48:51 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.295 [INFO][2909] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.316 [INFO][2923] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" HandleID="k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Workload="10.0.0.143-k8s-test--pod--1-eth0" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.324 [INFO][2923] ipam_plugin.go 268: Auto assigning IP ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" HandleID="k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Workload="10.0.0.143-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025d8a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"test-pod-1", "timestamp":"2024-02-12 19:49:07.316202113 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.324 [INFO][2923] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.324 [INFO][2923] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.324 [INFO][2923] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.326 [INFO][2923] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.329 [INFO][2923] ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.332 [INFO][2923] ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.333 [INFO][2923] ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.334 [INFO][2923] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.334 [INFO][2923] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.336 [INFO][2923] ipam.go 1682: Creating new handle: k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69 Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.338 [INFO][2923] ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.341 [INFO][2923] ipam.go 1216: Successfully claimed IPs: [192.168.66.4/26] block=192.168.66.0/26 handle="k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.341 [INFO][2923] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.4/26] handle="k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" host="10.0.0.143" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.341 [INFO][2923] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.341 [INFO][2923] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.66.4/26] IPv6=[] ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" HandleID="k8s-pod-network.d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Workload="10.0.0.143-k8s-test--pod--1-eth0" Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.343 [INFO][2909] k8s.go 385: Populated endpoint ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9b2c7b14-5394-4c7e-9944-8923b25797d5", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:07.352733 env[1111]: 2024-02-12 19:49:07.343 [INFO][2909] k8s.go 386: Calico CNI using IPs: [192.168.66.4/32] ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Feb 12 19:49:07.353399 env[1111]: 2024-02-12 19:49:07.343 [INFO][2909] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Feb 12 19:49:07.353399 env[1111]: 2024-02-12 19:49:07.347 [INFO][2909] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Feb 12 19:49:07.353399 env[1111]: 2024-02-12 19:49:07.347 [INFO][2909] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9b2c7b14-5394-4c7e-9944-8923b25797d5", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"fe:6e:f1:a7:13:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:07.353399 env[1111]: 2024-02-12 19:49:07.351 [INFO][2909] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Feb 12 19:49:07.360000 audit[2949]: NETFILTER_CFG table=filter:86 family=2 entries=38 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:07.360000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7ffcfc7a8b10 a2=0 a3=7ffcfc7a8afc items=0 ppid=2090 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.360000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:07.362867 env[1111]: time="2024-02-12T19:49:07.362812939Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:49:07.362867 env[1111]: time="2024-02-12T19:49:07.362852484Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:49:07.362943 env[1111]: time="2024-02-12T19:49:07.362862743Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:49:07.363041 env[1111]: time="2024-02-12T19:49:07.363009388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69 pid=2953 runtime=io.containerd.runc.v2 Feb 12 19:49:07.374966 systemd[1]: Started cri-containerd-d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69.scope. Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.382000 audit: BPF prog-id=117 op=LOAD Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2953 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336631636661626461626638363638643166623532663162393436 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2953 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336631636661626461626638363638643166623532663162393436 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit: BPF prog-id=118 op=LOAD Feb 12 19:49:07.383000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000279d90 items=0 ppid=2953 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336631636661626461626638363638643166623532663162393436 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit: BPF prog-id=119 op=LOAD Feb 12 19:49:07.383000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000279dd8 items=0 ppid=2953 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336631636661626461626638363638643166623532663162393436 Feb 12 19:49:07.383000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:49:07.383000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { perfmon } for pid=2962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit[2962]: AVC avc: denied { bpf } for pid=2962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.383000 audit: BPF prog-id=120 op=LOAD Feb 12 19:49:07.383000 audit[2962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f01e8 items=0 ppid=2953 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430336631636661626461626638363638643166623532663162393436 Feb 12 19:49:07.384254 systemd-resolved[1058]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:49:07.404338 env[1111]: time="2024-02-12T19:49:07.404298210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9b2c7b14-5394-4c7e-9944-8923b25797d5,Namespace:default,Attempt:0,} returns sandbox id \"d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69\"" Feb 12 19:49:07.406830 env[1111]: time="2024-02-12T19:49:07.406792459Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:49:07.877794 env[1111]: time="2024-02-12T19:49:07.877758647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:07.879341 env[1111]: time="2024-02-12T19:49:07.879306277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:07.880781 env[1111]: time="2024-02-12T19:49:07.880745823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:07.882114 env[1111]: time="2024-02-12T19:49:07.882075303Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:07.882558 env[1111]: time="2024-02-12T19:49:07.882533424Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 19:49:07.884036 env[1111]: time="2024-02-12T19:49:07.884006613Z" level=info msg="CreateContainer within sandbox \"d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 19:49:07.895494 env[1111]: time="2024-02-12T19:49:07.895459725Z" level=info msg="CreateContainer within sandbox \"d03f1cfabdabf8668d1fb52f1b9469626de5903368f6fe540f7b9de0e6827b69\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"c13bf6d8e30883b469f32f45cc750ba33f86ffb5b904223aeb60f6f9a7a3830e\"" Feb 12 19:49:07.896182 env[1111]: time="2024-02-12T19:49:07.896124294Z" level=info msg="StartContainer for \"c13bf6d8e30883b469f32f45cc750ba33f86ffb5b904223aeb60f6f9a7a3830e\"" Feb 12 19:49:07.910419 systemd[1]: Started cri-containerd-c13bf6d8e30883b469f32f45cc750ba33f86ffb5b904223aeb60f6f9a7a3830e.scope. Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit: BPF prog-id=121 op=LOAD Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2953 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336266366438653330383833623436396633326634356363373530 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2953 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336266366438653330383833623436396633326634356363373530 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.919000 audit: BPF prog-id=122 op=LOAD Feb 12 19:49:07.919000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2860 items=0 ppid=2953 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336266366438653330383833623436396633326634356363373530 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit: BPF prog-id=123 op=LOAD Feb 12 19:49:07.920000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c28a8 items=0 ppid=2953 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336266366438653330383833623436396633326634356363373530 Feb 12 19:49:07.920000 audit: BPF prog-id=123 op=UNLOAD Feb 12 19:49:07.920000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:07.920000 audit: BPF prog-id=124 op=LOAD Feb 12 19:49:07.920000 audit[2995]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2cb8 items=0 ppid=2953 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:07.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331336266366438653330383833623436396633326634356363373530 Feb 12 19:49:07.930754 env[1111]: time="2024-02-12T19:49:07.930711055Z" level=info msg="StartContainer for \"c13bf6d8e30883b469f32f45cc750ba33f86ffb5b904223aeb60f6f9a7a3830e\" returns successfully" Feb 12 19:49:08.168456 kubelet[1419]: E0212 19:49:08.168420 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:08.268322 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1550229390.mount: Deactivated successfully. Feb 12 19:49:08.321909 kubelet[1419]: I0212 19:49:08.321882 1419 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.845543935 podCreationTimestamp="2024-02-12 19:48:51 +0000 UTC" firstStartedPulling="2024-02-12 19:49:07.406434927 +0000 UTC m=+57.617891019" lastFinishedPulling="2024-02-12 19:49:07.882736225 +0000 UTC m=+58.094192317" observedRunningTime="2024-02-12 19:49:08.321499444 +0000 UTC m=+58.532955536" watchObservedRunningTime="2024-02-12 19:49:08.321845233 +0000 UTC m=+58.533301326" Feb 12 19:49:09.169163 kubelet[1419]: E0212 19:49:09.169129 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:09.294052 systemd-networkd[1011]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 19:49:09.842000 audit[3046]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:09.842000 audit[3046]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd086edfa0 a2=0 a3=7ffd086edf8c items=0 ppid=1657 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:09.846004 kubelet[1419]: I0212 19:49:09.845977 1419 topology_manager.go:215] "Topology Admit Handler" podUID="2362a1c3-af1c-4de3-b2b6-f9a2744a2976" podNamespace="calico-apiserver" podName="calico-apiserver-784d47c46b-4gcpv" Feb 12 19:49:09.843000 audit[3046]: NETFILTER_CFG table=nat:88 family=2 entries=44 op=nft_register_rule pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:09.843000 audit[3046]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffd086edfa0 a2=0 a3=7ffd086edf8c items=0 ppid=1657 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.843000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:09.850503 systemd[1]: Created slice kubepods-besteffort-pod2362a1c3_af1c_4de3_b2b6_f9a2744a2976.slice. Feb 12 19:49:09.854000 audit[3048]: NETFILTER_CFG table=filter:89 family=2 entries=10 op=nft_register_rule pid=3048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:09.854000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc3c3247a0 a2=0 a3=7ffc3c32478c items=0 ppid=1657 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:09.856000 audit[3048]: NETFILTER_CFG table=nat:90 family=2 entries=44 op=nft_register_rule pid=3048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:09.856000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc3c3247a0 a2=0 a3=7ffc3c32478c items=0 ppid=1657 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:09.922155 kubelet[1419]: I0212 19:49:09.922121 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pq5l6\" (UniqueName: \"kubernetes.io/projected/2362a1c3-af1c-4de3-b2b6-f9a2744a2976-kube-api-access-pq5l6\") pod \"calico-apiserver-784d47c46b-4gcpv\" (UID: \"2362a1c3-af1c-4de3-b2b6-f9a2744a2976\") " pod="calico-apiserver/calico-apiserver-784d47c46b-4gcpv" Feb 12 19:49:09.922155 kubelet[1419]: I0212 19:49:09.922157 1419 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2362a1c3-af1c-4de3-b2b6-f9a2744a2976-calico-apiserver-certs\") pod \"calico-apiserver-784d47c46b-4gcpv\" (UID: \"2362a1c3-af1c-4de3-b2b6-f9a2744a2976\") " pod="calico-apiserver/calico-apiserver-784d47c46b-4gcpv" Feb 12 19:49:10.022552 kubelet[1419]: E0212 19:49:10.022524 1419 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:49:10.022691 kubelet[1419]: E0212 19:49:10.022586 1419 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2362a1c3-af1c-4de3-b2b6-f9a2744a2976-calico-apiserver-certs podName:2362a1c3-af1c-4de3-b2b6-f9a2744a2976 nodeName:}" failed. No retries permitted until 2024-02-12 19:49:10.522570291 +0000 UTC m=+60.734026383 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/2362a1c3-af1c-4de3-b2b6-f9a2744a2976-calico-apiserver-certs") pod "calico-apiserver-784d47c46b-4gcpv" (UID: "2362a1c3-af1c-4de3-b2b6-f9a2744a2976") : secret "calico-apiserver-certs" not found Feb 12 19:49:10.131041 kubelet[1419]: E0212 19:49:10.130970 1419 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:10.134488 env[1111]: time="2024-02-12T19:49:10.134455974Z" level=info msg="StopPodSandbox for \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\"" Feb 12 19:49:10.169853 kubelet[1419]: E0212 19:49:10.169816 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.161 [WARNING][3064] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--sjfgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bb7e11a9-b9b7-4de6-980f-5bf9f9111203", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8", Pod:"csi-node-driver-sjfgx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali17a2bac3c4f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.161 [INFO][3064] k8s.go 578: Cleaning up netns ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.162 [INFO][3064] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" iface="eth0" netns="" Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.162 [INFO][3064] k8s.go 585: Releasing IP address(es) ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.162 [INFO][3064] utils.go 188: Calico CNI releasing IP address ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.175 [INFO][3072] ipam_plugin.go 415: Releasing address using handleID ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.175 [INFO][3072] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.176 [INFO][3072] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.181 [WARNING][3072] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.181 [INFO][3072] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.182 [INFO][3072] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:10.184682 env[1111]: 2024-02-12 19:49:10.183 [INFO][3064] k8s.go 591: Teardown processing complete. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:49:10.185041 env[1111]: time="2024-02-12T19:49:10.184708172Z" level=info msg="TearDown network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\" successfully" Feb 12 19:49:10.185041 env[1111]: time="2024-02-12T19:49:10.184744210Z" level=info msg="StopPodSandbox for \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\" returns successfully" Feb 12 19:49:10.185262 env[1111]: time="2024-02-12T19:49:10.185234131Z" level=info msg="RemovePodSandbox for \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\"" Feb 12 19:49:10.185389 env[1111]: time="2024-02-12T19:49:10.185338948Z" level=info msg="Forcibly stopping sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\"" Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.213 [WARNING][3093] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--sjfgx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bb7e11a9-b9b7-4de6-980f-5bf9f9111203", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"cb5cd119f265115edb62ead58b66ccbd61cc0e1e74cc4d24a6f8764d52f1e2f8", Pod:"csi-node-driver-sjfgx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali17a2bac3c4f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.213 [INFO][3093] k8s.go 578: Cleaning up netns ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.213 [INFO][3093] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" iface="eth0" netns="" Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.213 [INFO][3093] k8s.go 585: Releasing IP address(es) ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.213 [INFO][3093] utils.go 188: Calico CNI releasing IP address ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.228 [INFO][3103] ipam_plugin.go 415: Releasing address using handleID ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.228 [INFO][3103] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.228 [INFO][3103] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.234 [WARNING][3103] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.234 [INFO][3103] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" HandleID="k8s-pod-network.ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Workload="10.0.0.143-k8s-csi--node--driver--sjfgx-eth0" Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.236 [INFO][3103] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:10.238384 env[1111]: 2024-02-12 19:49:10.237 [INFO][3093] k8s.go 591: Teardown processing complete. ContainerID="ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69" Feb 12 19:49:10.238797 env[1111]: time="2024-02-12T19:49:10.238392310Z" level=info msg="TearDown network for sandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\" successfully" Feb 12 19:49:10.241084 env[1111]: time="2024-02-12T19:49:10.241061606Z" level=info msg="RemovePodSandbox \"ad9db376d86e1c7688d02b8abee5cb383f931a3ff4bfb5ae29e405e125c8ab69\" returns successfully" Feb 12 19:49:10.241453 env[1111]: time="2024-02-12T19:49:10.241422524Z" level=info msg="StopPodSandbox for \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\"" Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.270 [WARNING][3126] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"579e955c-0c83-41fb-851a-13a7af45b100", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129", Pod:"nginx-deployment-6d5f899847-fpdg6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali03668f8adf5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.270 [INFO][3126] k8s.go 578: Cleaning up netns ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.270 [INFO][3126] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" iface="eth0" netns="" Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.270 [INFO][3126] k8s.go 585: Releasing IP address(es) ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.270 [INFO][3126] utils.go 188: Calico CNI releasing IP address ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.285 [INFO][3134] ipam_plugin.go 415: Releasing address using handleID ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.285 [INFO][3134] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.285 [INFO][3134] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.290 [WARNING][3134] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.291 [INFO][3134] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.292 [INFO][3134] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:10.296390 env[1111]: 2024-02-12 19:49:10.293 [INFO][3126] k8s.go 591: Teardown processing complete. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:49:10.296833 env[1111]: time="2024-02-12T19:49:10.296415340Z" level=info msg="TearDown network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\" successfully" Feb 12 19:49:10.296833 env[1111]: time="2024-02-12T19:49:10.296446299Z" level=info msg="StopPodSandbox for \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\" returns successfully" Feb 12 19:49:10.296960 env[1111]: time="2024-02-12T19:49:10.296919117Z" level=info msg="RemovePodSandbox for \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\"" Feb 12 19:49:10.297109 env[1111]: time="2024-02-12T19:49:10.296959302Z" level=info msg="Forcibly stopping sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\"" Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.323 [WARNING][3157] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"579e955c-0c83-41fb-851a-13a7af45b100", ResourceVersion:"958", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"34155fe89fcc6193ad922a506cc7336eb2475df8d690c394bd1173280ea29129", Pod:"nginx-deployment-6d5f899847-fpdg6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali03668f8adf5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.323 [INFO][3157] k8s.go 578: Cleaning up netns ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.323 [INFO][3157] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" iface="eth0" netns="" Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.323 [INFO][3157] k8s.go 585: Releasing IP address(es) ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.323 [INFO][3157] utils.go 188: Calico CNI releasing IP address ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.337 [INFO][3164] ipam_plugin.go 415: Releasing address using handleID ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.337 [INFO][3164] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.337 [INFO][3164] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.342 [WARNING][3164] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.342 [INFO][3164] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" HandleID="k8s-pod-network.0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Workload="10.0.0.143-k8s-nginx--deployment--6d5f899847--fpdg6-eth0" Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.344 [INFO][3164] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:10.345982 env[1111]: 2024-02-12 19:49:10.344 [INFO][3157] k8s.go 591: Teardown processing complete. ContainerID="0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e" Feb 12 19:49:10.346411 env[1111]: time="2024-02-12T19:49:10.346037545Z" level=info msg="TearDown network for sandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\" successfully" Feb 12 19:49:10.348586 env[1111]: time="2024-02-12T19:49:10.348560856Z" level=info msg="RemovePodSandbox \"0847b740b9dc1181dbe085be6f4d95f67343f0cf0d5602afa2dc568bf7a0375e\" returns successfully" Feb 12 19:49:10.753681 env[1111]: time="2024-02-12T19:49:10.753644834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-784d47c46b-4gcpv,Uid:2362a1c3-af1c-4de3-b2b6-f9a2744a2976,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:49:10.836975 systemd-networkd[1011]: caliea1ec4d9da4: Link UP Feb 12 19:49:10.838699 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:49:10.838798 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea1ec4d9da4: link becomes ready Feb 12 19:49:10.838969 systemd-networkd[1011]: caliea1ec4d9da4: Gained carrier Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.787 [INFO][3172] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0 calico-apiserver-784d47c46b- calico-apiserver 2362a1c3-af1c-4de3-b2b6-f9a2744a2976 1113 0 2024-02-12 19:49:09 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:784d47c46b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.143 calico-apiserver-784d47c46b-4gcpv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliea1ec4d9da4 [] []}} ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-4gcpv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.787 [INFO][3172] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-4gcpv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.806 [INFO][3187] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" HandleID="k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Workload="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.813 [INFO][3187] ipam_plugin.go 268: Auto assigning IP ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" HandleID="k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Workload="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000d5ae0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.143", "pod":"calico-apiserver-784d47c46b-4gcpv", "timestamp":"2024-02-12 19:49:10.806163962 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.813 [INFO][3187] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.813 [INFO][3187] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.813 [INFO][3187] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.815 [INFO][3187] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.820 [INFO][3187] ipam.go 372: Looking up existing affinities for host host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.823 [INFO][3187] ipam.go 489: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.825 [INFO][3187] ipam.go 155: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.826 [INFO][3187] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.826 [INFO][3187] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.827 [INFO][3187] ipam.go 1682: Creating new handle: k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4 Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.830 [INFO][3187] ipam.go 1203: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.833 [INFO][3187] ipam.go 1216: Successfully claimed IPs: [192.168.66.5/26] block=192.168.66.0/26 handle="k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.833 [INFO][3187] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.66.5/26] handle="k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" host="10.0.0.143" Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.833 [INFO][3187] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:10.846037 env[1111]: 2024-02-12 19:49:10.833 [INFO][3187] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.66.5/26] IPv6=[] ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" HandleID="k8s-pod-network.1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Workload="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" Feb 12 19:49:10.846555 env[1111]: 2024-02-12 19:49:10.835 [INFO][3172] k8s.go 385: Populated endpoint ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-4gcpv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0", GenerateName:"calico-apiserver-784d47c46b-", Namespace:"calico-apiserver", SelfLink:"", UID:"2362a1c3-af1c-4de3-b2b6-f9a2744a2976", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 49, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"784d47c46b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"calico-apiserver-784d47c46b-4gcpv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea1ec4d9da4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:10.846555 env[1111]: 2024-02-12 19:49:10.835 [INFO][3172] k8s.go 386: Calico CNI using IPs: [192.168.66.5/32] ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-4gcpv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" Feb 12 19:49:10.846555 env[1111]: 2024-02-12 19:49:10.835 [INFO][3172] dataplane_linux.go 68: Setting the host side veth name to caliea1ec4d9da4 ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-4gcpv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" Feb 12 19:49:10.846555 env[1111]: 2024-02-12 19:49:10.838 [INFO][3172] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-4gcpv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" Feb 12 19:49:10.846555 env[1111]: 2024-02-12 19:49:10.838 [INFO][3172] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-4gcpv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0", GenerateName:"calico-apiserver-784d47c46b-", Namespace:"calico-apiserver", SelfLink:"", UID:"2362a1c3-af1c-4de3-b2b6-f9a2744a2976", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 49, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"784d47c46b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4", Pod:"calico-apiserver-784d47c46b-4gcpv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea1ec4d9da4", MAC:"0a:ba:e0:25:4a:49", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:10.846555 env[1111]: 2024-02-12 19:49:10.844 [INFO][3172] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4" Namespace="calico-apiserver" Pod="calico-apiserver-784d47c46b-4gcpv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--784d47c46b--4gcpv-eth0" Feb 12 19:49:10.857000 audit[3218]: NETFILTER_CFG table=filter:91 family=2 entries=59 op=nft_register_chain pid=3218 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:10.857000 audit[3218]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe68f81c40 a2=0 a3=7ffe68f81c2c items=0 ppid=2090 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.857000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:10.858606 env[1111]: time="2024-02-12T19:49:10.858556883Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:49:10.858606 env[1111]: time="2024-02-12T19:49:10.858588843Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:49:10.858606 env[1111]: time="2024-02-12T19:49:10.858598592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:49:10.858838 env[1111]: time="2024-02-12T19:49:10.858733496Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4 pid=3223 runtime=io.containerd.runc.v2 Feb 12 19:49:10.868464 systemd[1]: Started cri-containerd-1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4.scope. Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit: BPF prog-id=125 op=LOAD Feb 12 19:49:10.878000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3223 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163633163343466626435393339613030336639333537346365383963 Feb 12 19:49:10.878000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.878000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3223 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163633163343466626435393339613030336639333537346365383963 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit: BPF prog-id=126 op=LOAD Feb 12 19:49:10.879000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000323a60 items=0 ppid=3223 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163633163343466626435393339613030336639333537346365383963 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit: BPF prog-id=127 op=LOAD Feb 12 19:49:10.879000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000323aa8 items=0 ppid=3223 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163633163343466626435393339613030336639333537346365383963 Feb 12 19:49:10.879000 audit: BPF prog-id=127 op=UNLOAD Feb 12 19:49:10.879000 audit: BPF prog-id=126 op=UNLOAD Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:10.879000 audit: BPF prog-id=128 op=LOAD Feb 12 19:49:10.879000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000323eb8 items=0 ppid=3223 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163633163343466626435393339613030336639333537346365383963 Feb 12 19:49:10.879998 systemd-resolved[1058]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Feb 12 19:49:10.898445 env[1111]: time="2024-02-12T19:49:10.897370347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-784d47c46b-4gcpv,Uid:2362a1c3-af1c-4de3-b2b6-f9a2744a2976,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"1cc1c44fbd5939a003f93574ce89c3077013687ecd4a6585932fcedaca45b5d4\"" Feb 12 19:49:10.898598 env[1111]: time="2024-02-12T19:49:10.898570543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:49:11.170805 kubelet[1419]: E0212 19:49:11.170773 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:12.171527 kubelet[1419]: E0212 19:49:12.171472 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:12.813476 systemd-networkd[1011]: caliea1ec4d9da4: Gained IPv6LL Feb 12 19:49:13.172018 kubelet[1419]: E0212 19:49:13.171982 1419 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"